WO2024022355A1 - Security vulnerability scanning task processing method based on rpa and ai, and related device - Google Patents

Security vulnerability scanning task processing method based on rpa and ai, and related device Download PDF

Info

Publication number
WO2024022355A1
WO2024022355A1 PCT/CN2023/109171 CN2023109171W WO2024022355A1 WO 2024022355 A1 WO2024022355 A1 WO 2024022355A1 CN 2023109171 W CN2023109171 W CN 2023109171W WO 2024022355 A1 WO2024022355 A1 WO 2024022355A1
Authority
WO
WIPO (PCT)
Prior art keywords
security vulnerability
scanning
vulnerability scanning
task
target
Prior art date
Application number
PCT/CN2023/109171
Other languages
French (fr)
Chinese (zh)
Inventor
丰光涛
Original Assignee
北京来也网络科技有限公司
来也科技(北京)有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 北京来也网络科技有限公司, 来也科技(北京)有限公司 filed Critical 北京来也网络科技有限公司
Publication of WO2024022355A1 publication Critical patent/WO2024022355A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/566Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities

Abstract

The present disclosure relates to the fields of AI and RPA. Provided are a security vulnerability scanning task processing method based on RPA and AI, and a related device. The method comprises: determining the task type of a target security vulnerability scanning task to be processed; according to the task type, starting a security vulnerability scanning application program corresponding to the task type; and when the security vulnerability scanning application program is successfully started, configuring, in the security vulnerability scanning application program, scanning information of said target security vulnerability scanning task, so as to perform, according to the configured scanning information, scanning processing addressing said target security vulnerability scanning task. In this way, a security vulnerability scanning task can be processed without operations which are manually and frequently performed and have fixed and repeated steps, such that security engineers can be set free from tedious and repeated work.

Description

基于RPA和AI的安全漏洞扫描任务处理方法及相关设备Security vulnerability scanning task processing method and related equipment based on RPA and AI
相关申请的交叉引用Cross-references to related applications
本申请要求在2022年07月25日在中国提交的中国专利申请号2022108790845的优先权,其全部内容通过引用并入本文。This application claims priority from Chinese Patent Application No. 2022108790845 filed in China on July 25, 2022, the entire content of which is incorporated herein by reference.
技术领域Technical field
本公开涉及人工智能(Artificial Intelligence,简称AI)和机器人流程自动化(Robotic Process Automation,简称RPA)领域,具体涉及一种基于RPA和AI的安全漏洞扫描任务处理方法及相关设备。This disclosure relates to the fields of Artificial Intelligence (AI for short) and Robotic Process Automation (RPA for short), and specifically relates to a security vulnerability scanning task processing method and related equipment based on RPA and AI.
背景技术Background technique
RPA是通过特定的“机器人软件”,模拟人在计算机上的操作,按规则自动执行流程任务。RPA uses specific "robot software" to simulate human operations on computers and automatically execute process tasks according to rules.
AI是研究、开发用于模拟、延伸和扩展人的智能的理论、方法、技术及应用系统的一门技术科学。AI is a technical science that studies and develops theories, methods, technologies and application systems for simulating, extending and expanding human intelligence.
随着计算机软件技术和网络技术的发展,网络安全问题也日益突出。由于软件开发人员编码不当,可能导致我们日常使用的软件中存在大量的漏洞。如果计算机系统存在漏洞并且没有被及时发现和修复,黑客将通过漏洞窃取计算机系统或者用户的重要信息,造成严重的后果。With the development of computer software technology and network technology, network security issues have become increasingly prominent. Due to improper coding by software developers, there can be a large number of vulnerabilities in the software we use every day. If there are vulnerabilities in the computer system and are not discovered and repaired in time, hackers will steal important information of the computer system or users through the vulnerabilities, causing serious consequences.
相关技术中,为了及时发现网络安全问题,需要安全工程师定期进行网络安全漏洞扫描,由于网络安全漏洞扫描步骤较多且步骤固定重复,这种依赖人工频繁且步骤固定重复的操作进行安全漏洞扫描的方式,给安全工程师带来了极大的不便。In related technologies, in order to discover network security problems in a timely manner, security engineers are required to regularly scan network security vulnerabilities. Since network security vulnerability scanning has many steps and the steps are fixed and repeated, this kind of security vulnerability scanning relies on frequent manual operations with fixed and repeated steps. This method brings great inconvenience to safety engineers.
发明内容Contents of the invention
本公开旨在至少在一定程度上解决上述技术中的技术问题之一。The present disclosure aims to solve one of the technical problems in the above-mentioned technologies, at least to a certain extent.
为此,本公开实施例提出一种基于RPA和AI的安全漏洞扫描任务处理方法及相关设备,以实现通过RPA机器人自动启动与目标安全漏洞扫描任务的任务类型对应的安全漏洞扫描应用程序,并在该安全漏洞扫描应用程序中自动配置目标安全漏洞扫描任务的扫描信息,以使安全漏洞扫描应用程序对目标安全漏洞扫描任务进行扫描处理,无需人工频繁且步骤固定重复的操作进行安全漏洞扫描任务处理,可使安全工程师从枯燥重复的工作中解脱出来。 To this end, embodiments of the present disclosure propose a security vulnerability scanning task processing method and related equipment based on RPA and AI to automatically start a security vulnerability scanning application corresponding to the task type of the target security vulnerability scanning task through the RPA robot, and The security vulnerability scanning application automatically configures the scanning information of the target security vulnerability scanning task, so that the security vulnerability scanning application scans and processes the target security vulnerability scanning task, eliminating the need for frequent manual operations with fixed and repeated steps to perform the security vulnerability scanning task. Processing can free safety engineers from boring and repetitive work.
本公开第一方面实施例提出了一种基于机器人流程自动化RPA和人工智能AI的安全漏洞扫描任务处理方法,所述方法由RPA机器人执行,包括:确定待处理的目标安全漏洞扫描任务的任务类型;根据所述任务类型,启动与所述任务类型对应的安全漏洞扫描应用程序;在所述安全漏洞扫描应用程序启动成功的情况下,在所述安全漏洞扫描应用程序中配置所述目标安全漏洞扫描任务的扫描信息,以根据配置后的扫描信息对所述目标安全漏洞扫描任务进行扫描处理。The embodiment of the first aspect of the present disclosure proposes a security vulnerability scanning task processing method based on robotic process automation RPA and artificial intelligence AI. The method is executed by an RPA robot and includes: determining the task type of the target security vulnerability scanning task to be processed. ; According to the task type, start a security vulnerability scanning application corresponding to the task type; if the security vulnerability scanning application is successfully started, configure the target security vulnerability in the security vulnerability scanning application The scanning information of the scanning task is used to scan the target security vulnerability scanning task according to the configured scanning information.
本公开第二方面实施例提出了一种基于机器人流程自动化RPA和人工智能AI的安全漏洞扫描任务处理装置,应用于RPA机器人,包括:确定模块,用于确定待处理的目标安全漏洞扫描任务的任务类型;启动模块,用于根据所述任务类型,启动与所述任务类型对应的安全漏洞扫描应用程序;处理模块,用于在所述安全漏洞扫描应用程序启动成功的情况下,在所述安全漏洞扫描应用程序中配置所述目标安全漏洞扫描任务的扫描信息,以根据配置后的扫描信息对所述目标安全漏洞扫描任务进行扫描处理。The embodiment of the second aspect of the present disclosure proposes a security vulnerability scanning task processing device based on robotic process automation RPA and artificial intelligence AI, which is applied to the RPA robot and includes: a determination module for determining the target security vulnerability scanning task to be processed. Task type; a startup module, used to start a security vulnerability scanning application corresponding to the task type according to the task type; a processing module, used to start the security vulnerability scanning application when the security vulnerability scanning application is successfully started. The scanning information of the target security vulnerability scanning task is configured in the security vulnerability scanning application, so that the target security vulnerability scanning task is scanned and processed according to the configured scanning information.
本公开第三方面实施例提出了一种电子设备,包括存储器、处理器及存储在存储器上并可在处理器上运行的计算机程序,所述处理器执行所述计算机程序时,实现如本公开上述第一方面实施例所述的方法。The third embodiment of the present disclosure provides an electronic device, including a memory, a processor, and a computer program stored in the memory and executable on the processor. When the processor executes the computer program, the present disclosure is implemented. The method described in the above embodiment of the first aspect.
本公开第四方面实施例提出了一种非临时性计算机可读存储介质,其上存储有计算机程序,该计算机程序被处理器执行时实现如本公开上述第一方面实施例所述的方法。The fourth embodiment of the present disclosure provides a non-transitory computer-readable storage medium on which a computer program is stored. When the computer program is executed by a processor, the method described in the first embodiment of the disclosure is implemented.
本公开第五方面实施例提出了一种计算机程序产品,包括计算机程序,所述计算机程序在被处理器执行时实现如本公开上述第一方面实施例所述的方法。The fifth aspect embodiment of the present disclosure proposes a computer program product, which includes a computer program. When executed by a processor, the computer program implements the method described in the above first aspect embodiment of the present disclosure.
本公开第六方面实施例提出了一种计算机程序,所述计算机程序包括计算机程序代码,当所述计算机程序代码在计算机上运行时,使得计算机执行如本公开上述第一方面实施例所述的方法。The sixth embodiment of the present disclosure provides a computer program. The computer program includes computer program code. When the computer program code is run on a computer, it causes the computer to execute the method described in the first embodiment of the present disclosure. method.
本公开实施例所提供的技术方案包含如下的有益效果:The technical solutions provided by the embodiments of the present disclosure include the following beneficial effects:
本公开技术方案,通过RPA机器人确定待处理的目标安全漏洞扫描任务的任务类型;根据所述任务类型,启动与所述任务类型对应的安全漏洞扫描应用程序;在所述安全漏洞扫描应用程序启动成功的情况下,在所述安全漏洞扫描应用程序中配置所述目标安全漏洞扫描任务的扫描信息,以根据配置后的扫描信息对所述目标安全漏洞扫描任务进行扫描处理,由此,通过RPA机器人自动启动与目标安全漏洞扫描任务的任务类型对应的安全漏洞扫描应用程序,并在该安全漏洞扫描应用程序中自动配置目标安全漏洞扫描任务的扫描信息,以使安全漏洞扫描应用程序对目标安全漏洞扫描任务进行扫描处理,无需人工频繁且步骤固定重复的操作进行安全漏洞扫描任务处理,可使安全工程师从枯燥重复的工作中解脱出来。 The disclosed technical solution uses an RPA robot to determine the task type of the target security vulnerability scanning task to be processed; according to the task type, start the security vulnerability scanning application corresponding to the task type; when the security vulnerability scanning application is started If successful, the scanning information of the target security vulnerability scanning task is configured in the security vulnerability scanning application, so that the target security vulnerability scanning task is scanned and processed according to the configured scanning information, thereby, through RPA The robot automatically starts a security vulnerability scanning application corresponding to the task type of the target security vulnerability scanning task, and automatically configures the scanning information of the target security vulnerability scanning task in the security vulnerability scanning application, so that the security vulnerability scanning application is safe for the target. Vulnerability scanning tasks are scanned and processed, eliminating the need for frequent manual operations with fixed and repetitive steps to process security vulnerability scanning tasks, which can free security engineers from boring and repetitive work.
本公开附加的方面和优点将在下面的描述中部分给出,部分将从下面的描述中变得明显,或通过本公开的实践了解到。Additional aspects and advantages of the disclosure will be set forth in part in the description which follows, and in part will be obvious from the description, or may be learned by practice of the disclosure.
附图说明Description of drawings
本公开上述的和/或附加的方面和优点从下面结合附图对实施例的描述中将变得明显和容易理解,其中:The above and/or additional aspects and advantages of the present disclosure will become apparent and readily understood from the following description of the embodiments in conjunction with the accompanying drawings, in which:
图1为相关技术中所提供的一种主机安全漏洞扫描方法的流程示意图;Figure 1 is a schematic flow chart of a host security vulnerability scanning method provided in related technologies;
图2为相关技术中所提供的一种网站安全漏洞扫描方法的流程示意图;Figure 2 is a schematic flow chart of a website security vulnerability scanning method provided in related technologies;
图3为本公开实施例所提供的一种基于RPA和AI的安全漏洞扫描任务处理方法的流程示意图;Figure 3 is a schematic flow chart of a security vulnerability scanning task processing method based on RPA and AI provided by an embodiment of the present disclosure;
图4为本公开实施例所提供的另一种基于RPA和AI的安全漏洞扫描任务处理方法的流程示意图;Figure 4 is a schematic flow chart of another security vulnerability scanning task processing method based on RPA and AI provided by an embodiment of the present disclosure;
图5为本公开实施例所提供的另一种基于RPA和AI的安全漏洞扫描任务处理方法的流程示意图;Figure 5 is a schematic flowchart of another security vulnerability scanning task processing method based on RPA and AI provided by an embodiment of the present disclosure;
图6为本公开实施例所提供的另一种基于RPA和AI的安全漏洞扫描任务处理方法的流程示意图;Figure 6 is a schematic flowchart of another security vulnerability scanning task processing method based on RPA and AI provided by an embodiment of the present disclosure;
图7为本公开实施例所提供的另一种基于RPA和AI的安全漏洞扫描任务处理方法的流程示意图;Figure 7 is a schematic flow chart of another security vulnerability scanning task processing method based on RPA and AI provided by an embodiment of the present disclosure;
图8为本公开实施例所提供的另一种基于RPA和AI的安全漏洞扫描任务处理方法的流程示意图;Figure 8 is a schematic flow chart of another security vulnerability scanning task processing method based on RPA and AI provided by an embodiment of the present disclosure;
图9为本公开实施例所提供的主机扫描新建任务页面示意图;Figure 9 is a schematic diagram of a new task page for host scanning provided by an embodiment of the present disclosure;
图10为本公开实施例所提供的基于RPA和AI的主机安全漏洞扫描提交页面示意图;Figure 10 is a schematic diagram of a host security vulnerability scanning submission page based on RPA and AI provided by an embodiment of the present disclosure;
图11为本公开实施例所提供的基于RPA和AI的主机安全漏洞扫描的扫描进度示意图;Figure 11 is a schematic diagram of the scanning progress of host security vulnerability scanning based on RPA and AI provided by an embodiment of the present disclosure;
图12为本公开实施例所提供的另一种基于RPA和AI的安全漏洞扫描任务处理方法的流程示意图;Figure 12 is a schematic flow chart of another security vulnerability scanning task processing method based on RPA and AI provided by an embodiment of the present disclosure;
图13为本公开实施例所提供的网站扫描任务新建界面示意图;Figure 13 is a schematic diagram of a new website scanning task interface provided by an embodiment of the present disclosure;
图14为本公开实施例所提供的一种网站安全漏洞扫描任务的扫描配置向导示意图;Figure 14 is a schematic diagram of a scanning configuration wizard for a website security vulnerability scanning task provided by an embodiment of the present disclosure;
图15为本公开实施例所提供的另一种网站安全漏洞扫描任务的扫描配置向导示意图;Figure 15 is a schematic diagram of a scanning configuration wizard for another website security vulnerability scanning task provided by an embodiment of the present disclosure;
图16为本公开实施例所提供的另一种网站安全漏洞扫描任务的扫描配置向导示意图;Figure 16 is a schematic diagram of a scanning configuration wizard for another website security vulnerability scanning task provided by an embodiment of the present disclosure;
图17为本公开实施例所提供的另一种网站安全漏洞扫描任务的扫描配置向导示意图;Figure 17 is a schematic diagram of a scanning configuration wizard for another website security vulnerability scanning task provided by an embodiment of the present disclosure;
图18为本公开实施例所提供的另一种网站安全漏洞扫描任务的扫描配置向导示意图;Figure 18 is a schematic diagram of a scanning configuration wizard for another website security vulnerability scanning task provided by an embodiment of the present disclosure;
图19为本公开实施例所提供的一种网站安全漏洞扫描任务的扫描结果配置向导示意 图;Figure 19 is a schematic diagram of the scanning result configuration wizard of a website security vulnerability scanning task provided by an embodiment of the present disclosure. picture;
图20为本公开实施例所提供的一种基于RPA和AI的安全漏洞扫描任务处理装置的流程示意图;Figure 20 is a schematic flowchart of a security vulnerability scanning task processing device based on RPA and AI provided by an embodiment of the present disclosure;
图21是根据本公开实施例示出的一种用于基于RPA和AI的安全漏洞扫描任务处理方法的电子设备的框图。Figure 21 is a block diagram of an electronic device used for a security vulnerability scanning task processing method based on RPA and AI according to an embodiment of the present disclosure.
具体实施方式Detailed ways
下面详细描述本公开的实施例,所述实施例的示例在附图中示出,其中自始至终相同或类似的标号表示相同或类似的元件或具有相同或类似功能的元件。下面通过参考附图描述的实施例是示例性的,旨在用于解释本公开,而不能理解为对本公开的限制。Embodiments of the present disclosure are described in detail below, examples of which are illustrated in the accompanying drawings, wherein the same or similar reference numerals throughout represent the same or similar elements or elements having the same or similar functions. The embodiments described below with reference to the drawings are exemplary and intended to explain the present disclosure, but are not to be construed as limitations of the present disclosure.
为了及时发现网络安全问题,需要安全工程师定期进行网络安全漏洞扫描,由于网络安全漏洞扫描步骤较多且步骤固定重复,比如,如图1所示和图2所示,主机安全漏洞扫描以及网站安全漏洞扫描步骤多且步骤固定重复,并且,网络安全漏洞扫描结果及整改建议报告数量多,需要人工编写,并人工手动将网络安全漏洞扫描结果以及整改建议邮件发送以通知用户单位。这种依赖人工频繁且步骤固定重复的操作进行安全漏洞扫描,以及人工编写以及发送网络安全漏洞扫描结果及整改建议报告的方式,给安全工程师带来了极大的不便。In order to discover network security issues in a timely manner, security engineers need to perform network security vulnerability scanning regularly. Since network security vulnerability scanning has many steps and the steps are repetitive, for example, as shown in Figure 1 and Figure 2, host security vulnerability scanning and website security There are many steps in vulnerability scanning and the steps are repetitive. Moreover, there are a large number of reports on network security vulnerability scanning results and rectification suggestions, which need to be written manually, and the network security vulnerability scanning results and rectification suggestions are manually sent by email to notify the user unit. This method of relying on frequent manual operations with fixed and repetitive steps to scan security vulnerabilities, as well as manually writing and sending reports on network security vulnerability scan results and rectification suggestions, has brought great inconvenience to security engineers.
针对上述问题,本公开实施例提出了一种基于RPA和AI的安全漏洞扫描任务处理方法及相关设备。In response to the above problems, embodiments of the present disclosure propose a security vulnerability scanning task processing method and related equipment based on RPA and AI.
下面参考附图描述本公开实施例的基于RPA和AI的安全漏洞扫描任务处理方法及相关设备。在具体描述本公开实施例之前,为了便于理解,首先对常用技术词进行介绍:The security vulnerability scanning task processing method and related equipment based on RPA and AI according to the embodiment of the present disclosure will be described below with reference to the accompanying drawings. Before describing the embodiments of the present disclosure in detail, in order to facilitate understanding, common technical terms are first introduced:
“安全漏洞”,是指在硬件、软件、协议的具体实现或系统安全策略上存在的缺陷;"Security vulnerabilities" refer to defects in the specific implementation of hardware, software, protocols, or system security policies;
“任务类型”,是指目标安全漏洞扫描任务的类型,比如,主机扫描或网站扫描;"Task type" refers to the type of target security vulnerability scanning task, such as host scanning or website scanning;
“光学字符识别(Optical Character Recognition,简称OCR)”,是指电子设备检查纸上打印的字符,通过检测暗、亮的模式确定其形状,然后用字符识别方法将形状翻译成计算机文字的过程;即,针对印刷体字符,采用光学的方式将纸质文档中的文字转换成为黑白点阵的图像文件,并通过识别软件将图像中的文字转换成文本格式,供文字处理软件进一步编辑加工的技术;"Optical Character Recognition (OCR)" refers to the process in which electronic equipment examines characters printed on paper, determines their shape by detecting dark and light patterns, and then uses character recognition methods to translate the shape into computer text; That is, for printed characters, it uses optical methods to convert the text in the paper document into a black and white dot matrix image file, and uses recognition software to convert the text in the image into a text format for further editing and processing by word processing software. ;
“安全漏洞扫描应用程序”,是指可执行安全漏洞扫描任务的应用程序,比如,可执行主机安全漏洞任务的应用程序,或者,可执行网站安全漏洞任务的应用程序;"Security vulnerability scanning application" refers to an application that can perform security vulnerability scanning tasks, such as an application that can perform host security vulnerability tasks, or an application that can perform website security vulnerability tasks;
“扫描信息”,是指与目标安全漏洞扫描任务对应的扫描参数;"Scan information" refers to the scanning parameters corresponding to the target security vulnerability scanning task;
“扫描参数”,是指执行扫描的设定值,扫描参数可包括:执行扫描的时间段、扫描类 型以及扫描优先级等。"Scan parameters" refers to the setting values for executing the scan. The scan parameters may include: the time period during which the scan is executed, the scan type type and scan priority, etc.
“自然语言处理(Natural Language Processing,简称NLP)”指利用人类交流所使用的自然语言与机器进行交互通讯的技术,可应用于信息提取;"Natural Language Processing (NLP)" refers to the technology of interactive communication with machines using the natural language used in human communication, which can be applied to information extraction;
图3为本公开实施例所提供的一种基于RPA和AI的安全漏洞扫描任务处理方法的流程示意图。Figure 3 is a schematic flowchart of a security vulnerability scanning task processing method based on RPA and AI provided by an embodiment of the present disclosure.
本公开实施例提供的基于RPA和AI的安全漏洞扫描任务处理方法,该方法由RPA机器人执行,该RPA机器人可以运行在任一具有计算能力的电子设备中。其中,该电子设备可以是个人电脑、移动终端等,移动终端例如为手机、平板电脑、个人数字助理等具有各种操作系统的硬件设备。The security vulnerability scanning task processing method based on RPA and AI provided by the embodiment of the present disclosure is executed by an RPA robot, and the RPA robot can run in any electronic device with computing capabilities. The electronic device may be a personal computer, a mobile terminal, etc. The mobile terminal is, for example, a mobile phone, a tablet computer, a personal digital assistant and other hardware devices with various operating systems.
如图3所示,该基于RPA和AI的安全漏洞扫描任务处理方法可以包括以下步骤301至303。As shown in Figure 3, the security vulnerability scanning task processing method based on RPA and AI may include the following steps 301 to 303.
步骤301,确定待处理的目标安全漏洞扫描任务的任务类型。Step 301: Determine the task type of the target security vulnerability scanning task to be processed.
需要了解的是,不同的安全漏洞扫描任务对应的任务类型也不同,网络安全工程师可根据安全需求控制RPA机器人选择待处理的目标安全漏洞扫描任务的任务类型,比如,任务类型可为主机扫描或网站扫描。What needs to be understood is that different security vulnerability scanning tasks correspond to different task types. Network security engineers can control the RPA robot to select the task type of the target security vulnerability scanning task to be processed based on security requirements. For example, the task type can be host scanning or Website scanning.
步骤302,根据任务类型,启动与任务类型对应的安全漏洞扫描应用程序。Step 302: According to the task type, start the security vulnerability scanning application corresponding to the task type.
需要说明的是,不同的任务类型可对应相同的安全漏洞扫描应用程序,也可对应不同的安全漏洞扫描应用程序,即同一安全漏洞扫描应用可扫描处理多种类型的安全漏洞扫描任务,也可扫描处理一种类型的安全漏洞扫描任务,本公开不做具体限定。It should be noted that different task types can correspond to the same security vulnerability scanning application, or they can correspond to different security vulnerability scanning applications. That is, the same security vulnerability scanning application can scan and process multiple types of security vulnerability scanning tasks, or it can Scanning handles one type of security vulnerability scanning task, which is not specifically limited in this disclosure.
在本公开实施例中,RPA机器人可根据任务类型,查询并启动可处理该任务类型的安全漏洞扫描应用程序。其中,需要说明的是,响应于可处理该任务类型的安全漏洞扫描应用程序存在多个,随机选择其中一个安全漏洞扫描应用程序,并启动选择的安全漏洞扫描应用程序。In the embodiment of the present disclosure, the RPA robot can query and start a security vulnerability scanning application that can handle the task type according to the task type. Wherein, it should be noted that, in response to the existence of multiple security vulnerability scanning applications that can handle the task type, one of the security vulnerability scanning applications is randomly selected, and the selected security vulnerability scanning application is started.
步骤303,在安全漏洞扫描应用程序启动成功的情况下,在安全漏洞扫描应用程序中配置目标安全漏洞扫描任务的扫描信息,以根据配置后的扫描信息对目标安全漏洞扫描任务进行扫描处理。Step 303: When the security vulnerability scanning application is successfully started, configure the scanning information of the target security vulnerability scanning task in the security vulnerability scanning application, so as to scan the target security vulnerability scanning task according to the configured scanning information.
在一些实施例中,在安全漏洞扫描应用程序启动成功的情况下,可在安全漏洞扫描应用程序中进行扫描信息的配置,以使该安全漏洞扫描应用程序可根据配置后的扫描信息对目标安全漏洞扫描任务进行扫描处理。In some embodiments, when the security vulnerability scanning application is successfully started, the scanning information can be configured in the security vulnerability scanning application, so that the security vulnerability scanning application can perform target security based on the configured scanning information. Vulnerability scanning tasks perform scanning processing.
综上,通过RPA机器人自动启动与目标安全漏洞扫描任务的任务类型对应的安全漏洞扫描应用程序,并在该安全漏洞扫描应用程序中自动配置目标安全漏洞扫描任务的扫描信息,以使安全漏洞扫描应用程序对目标安全漏洞扫描任务进行扫描处理,无需人工频繁且 步骤固定重复的操作进行安全漏洞扫描任务的扫描处理,可使安全工程师从枯燥重复的工作中解脱出来。In summary, the RPA robot automatically starts the security vulnerability scanning application corresponding to the task type of the target security vulnerability scanning task, and automatically configures the scanning information of the target security vulnerability scanning task in the security vulnerability scanning application, so that the security vulnerability scanning The application performs scanning tasks on target security vulnerabilities without manual frequent and The steps are fixed and repeated to perform scanning and processing of security vulnerability scanning tasks, which can free security engineers from boring and repetitive work.
为了清楚地说明在安全漏洞扫描应用程序启动成功的情况下,RPA机器人如何在安全漏洞扫描应用程序中配置目标安全漏洞扫描任务的扫描信息,以使安全漏洞扫描应用程序根据配置后的扫描信息对目标安全漏洞扫描任务进行扫描处理的,如图4所示,图4为本公开实施例所提供的另一种基于RPA和AI的安全漏洞扫描任务处理方法的流程示意图。在本公开实施例中,RPA机器人可在安全漏洞扫描应用程序中新建目标安全漏洞扫描任务页面,并在该目标安全漏洞扫描任务页面中输入与目标安全漏洞扫描任务对应的扫描参数,并触发安全漏洞扫描应用程序中用于扫描目标安全漏洞扫描任务的控件,以使安全漏洞扫描应用程序对目标安全漏洞扫描任务进行处理,图4所示实施例可包括如下步骤401至405。In order to clearly explain how the RPA robot configures the scanning information of the target security vulnerability scanning task in the security vulnerability scanning application when the security vulnerability scanning application is successfully started, so that the security vulnerability scanning application can scan the target according to the configured scanning information. The target security vulnerability scanning task is scanned and processed as shown in Figure 4. Figure 4 is a schematic flow chart of another security vulnerability scanning task processing method based on RPA and AI provided by an embodiment of the present disclosure. In this disclosed embodiment, the RPA robot can create a new target security vulnerability scanning task page in the security vulnerability scanning application, enter the scanning parameters corresponding to the target security vulnerability scanning task in the target security vulnerability scanning task page, and trigger the security vulnerability scanning task page. The vulnerability scanning application is used to scan the target security vulnerability scanning task, so that the security vulnerability scanning application processes the target security vulnerability scanning task. The embodiment shown in Figure 4 may include the following steps 401 to 405.
步骤401,确定待处理的目标安全漏洞扫描任务的任务类型。Step 401: Determine the task type of the target security vulnerability scanning task to be processed.
步骤402,根据任务类型,启动与任务类型对应的安全漏洞扫描应用程序。Step 402: According to the task type, start a security vulnerability scanning application corresponding to the task type.
步骤403,在安全漏洞扫描应用程序启动成功的情况下,触发安全漏洞扫描应用程序中用于新建目标安全漏洞扫描任务页面的控件,以新建与任务类型对应的目标安全漏洞扫描任务页面。Step 403: When the security vulnerability scanning application is successfully started, trigger a control in the security vulnerability scanning application for creating a target security vulnerability scanning task page to create a new target security vulnerability scanning task page corresponding to the task type.
在一些实施例中,RPA机器人可在安全漏洞扫描应用程序启动成功的情况下,在安全漏洞扫描应用程序中自动触发用于新建目标安全漏洞扫描任务页面的控件,以使安全漏洞扫描应用程序新建与任务类型对应的目标安全漏洞扫描任务页面。In some embodiments, when the security vulnerability scanning application is successfully launched, the RPA robot can automatically trigger the control for creating a new target security vulnerability scanning task page in the security vulnerability scanning application, so that the security vulnerability scanning application can create a new Target security vulnerability scanning task page corresponding to the task type.
步骤404,目标安全漏洞扫描任务页面新建成功的情况下,在目标安全漏洞扫描任务页面,输入与目标安全漏洞扫描任务对应的扫描参数。Step 404: If the target security vulnerability scanning task page is successfully created, enter the scanning parameters corresponding to the target security vulnerability scanning task on the target security vulnerability scanning task page.
接着,在该目标安全漏洞扫描任务页面新建成功的情况下,RPA机器人可在新建的目标安全漏洞扫描任务页面中,自动输入与目标安全漏洞扫描任务对应的扫描参数。Then, if the target security vulnerability scanning task page is successfully created, the RPA robot can automatically enter the scanning parameters corresponding to the target security vulnerability scanning task in the newly created target security vulnerability scanning task page.
需要说明的是,RPA机器人在新建的目标安全漏洞扫描任务页面中,自动输入与目标安全漏洞扫描任务对应的扫描参数之前,可根据任务类型,获取与任务类型匹配的目标文件,并基于NLP技术,从目标文件中提取与目标安全漏洞扫描任务对应的扫描参数。It should be noted that before the RPA robot automatically enters the scanning parameters corresponding to the target security vulnerability scanning task in the newly created target security vulnerability scanning task page, it can obtain the target file matching the task type based on the task type, and based on NLP technology , extract the scanning parameters corresponding to the target security vulnerability scanning task from the target file.
也就是说,RPA机器人可根据任务类型,在安全漏洞扫描应用程的文件目录中查询与该任务类型匹配的目标文件,并基于NLP技术,从目标文件中提取与目标安全漏洞扫描任务对应的扫描参数,其中,扫描参数可包括但不限于执行扫描的扫描任务名称、执行扫描的时间段、扫描类型、扫描优先级以及执行扫描的主机网际互联协议(Internet Protocol,简称IP)地址或网站的统一资源定位系统(uniform resource locator,简称URL)地址等。That is to say, the RPA robot can query the file directory of the security vulnerability scanning application for the target file that matches the task type based on the task type, and based on NLP technology, extract the scan corresponding to the target security vulnerability scanning task from the target file. Parameters, where the scanning parameters may include but are not limited to the name of the scanning task to perform the scan, the time period during which the scan is performed, the type of scan, the priority of the scan, and the Internet Protocol (IP) address or website of the host that performs the scan. Resource locator (uniform resource locator, URL for short) address, etc.
步骤405,在扫描参数输入完成的情况下,触发安全漏洞扫描应用程序中用于扫描目标安全漏洞扫描任务的控件,以根据扫描参数对目标安全漏洞扫描任务进行扫描处理。 Step 405: After the input of scanning parameters is completed, trigger the control in the security vulnerability scanning application for scanning the target security vulnerability scanning task, so as to scan the target security vulnerability scanning task according to the scanning parameters.
进而,在扫描参数输入完成的情况下,RPA机器人可自动触发安全漏洞扫描应用程序中用于扫描目标安全漏洞扫描任务的控件,以使安全漏洞扫描应用程序根据扫描参数对目标安全漏洞扫描任务进行扫描处理。Furthermore, when the input of scanning parameters is completed, the RPA robot can automatically trigger the control in the security vulnerability scanning application for scanning the target security vulnerability scanning task, so that the security vulnerability scanning application can perform the target security vulnerability scanning task according to the scanning parameters. Scan processing.
需要说明的是,为了提高扫描处理的灵活性,在扫描参数输入完成的情况下,RPA机器人在触发安全漏洞扫描应用程序中用于扫描目标安全漏洞扫描任务的控件之前,还可对输入的扫描参数进行更新(比如,编辑和删除),在扫描参数更新后,RPA机器人触发安全漏洞扫描应用程序中用于扫描目标安全漏洞扫描任务的控件,以使安全漏洞扫描应用程序根据更新后的扫描参数对目标安全漏洞扫描任务进行扫描处理。It should be noted that in order to improve the flexibility of scanning processing, after the input of scanning parameters is completed, the RPA robot can also scan the input before triggering the control used to scan the target security vulnerability scanning task in the security vulnerability scanning application. The parameters are updated (for example, edited and deleted). After the scanning parameters are updated, the RPA robot triggers the control in the security vulnerability scanning application for scanning the target security vulnerability scanning task, so that the security vulnerability scanning application can be based on the updated scanning parameters. Scan and process the target security vulnerability scanning task.
需要说明的是,步骤401至402的执行过程可以分别采用本公开的各实施例中的任一种方式实现,本公开实施例并不对此作出限定,也不再赘述。It should be noted that the execution process of steps 401 to 402 can be implemented in any manner in the embodiments of the present disclosure. The embodiments of the present disclosure do not limit this and will not be described again.
综上,通过在安全漏洞扫描应用程序启动成功的情况下,触发安全漏洞扫描应用程序中用于新建目标安全漏洞扫描任务页面的控件,以新建与任务类型对应的目标安全漏洞扫描任务页面;目标安全漏洞扫描任务页面新建成功的情况下,在目标安全漏洞扫描任务页面,输入与目标安全漏洞扫描任务对应的扫描参数;在扫描参数输入完成的情况下,触发安全漏洞扫描应用程序中用于扫描目标安全漏洞扫描任务的控件,以根据扫描参数对目标安全漏洞扫描任务进行扫描处理,由此,RPA机器人可自动在安全漏洞扫描应用程序中配置目标安全漏洞扫描任务的扫描信息,无需人工配置,可提高扫描参数配置效率以及准确性。In summary, when the security vulnerability scanning application is successfully started, the control for creating a target security vulnerability scanning task page in the security vulnerability scanning application is triggered to create a new target security vulnerability scanning task page corresponding to the task type; target If the security vulnerability scanning task page is successfully created, on the target security vulnerability scanning task page, enter the scanning parameters corresponding to the target security vulnerability scanning task; when the scanning parameters are entered, trigger the scanning in the security vulnerability scanning application. The control of the target security vulnerability scanning task is used to scan and process the target security vulnerability scanning task according to the scanning parameters. Therefore, the RPA robot can automatically configure the scanning information of the target security vulnerability scanning task in the security vulnerability scanning application without manual configuration. It can improve the efficiency and accuracy of scanning parameter configuration.
为了清楚地说明RPA机器人如何根据任务类型,启动与任务类型对应的安全漏洞扫描应用程序的,如图5所示,图5为本公开实施例所提供的另一种基于RPA和AI的安全漏洞扫描任务处理方法的流程示意图。在本公开实施例中,响应于任务类型为主机扫描,在至少一个安全漏洞扫描应用程序中,查询并启动与任务类型对应的安全漏洞扫描应用程序,图5所示实施例可包括如下步骤501至505。In order to clearly illustrate how the RPA robot starts the security vulnerability scanning application corresponding to the task type according to the task type, as shown in Figure 5, Figure 5 is another security vulnerability based on RPA and AI provided by the embodiment of the present disclosure. Flow chart of scanning task processing method. In an embodiment of the present disclosure, in response to the task type being host scanning, in at least one security vulnerability scanning application, the security vulnerability scanning application corresponding to the task type is queried and started. The embodiment shown in Figure 5 may include the following steps 501 to 505.
步骤501,确定待处理的目标安全漏洞扫描任务的任务类型。Step 501: Determine the task type of the target security vulnerability scanning task to be processed.
步骤502,在至少一个安全漏洞扫描应用程序中,查询扫描处理的任务类型与主机扫描匹配的目标安全漏洞扫描应用程序。Step 502: In at least one security vulnerability scanning application, query the target security vulnerability scanning application whose task type for scanning processing matches host scanning.
在一些实施例中,RPA机器人根据至少一个安全漏洞应用程序中各安全漏洞应用程序的扫描处理的任务类型,查询与主机扫描匹配的目标安全漏洞扫描应用程序。基于扫描处理的任务类型与主机扫描匹配的安全漏洞扫描应用程序的个数为多个,从多个安全漏洞扫描应用程序中,随机选择其中的一个安全漏洞扫描应用程序作为目标安全漏洞扫描应用程序。In some embodiments, the RPA robot queries the target security vulnerability scanning application that matches the host scan based on the task type of scanning processing of each security vulnerability application in at least one security vulnerability application. The number of security vulnerability scanning applications that match the host scan based on the task type of scanning processing is multiple. From the multiple security vulnerability scanning applications, one of the security vulnerability scanning applications is randomly selected as the target security vulnerability scanning application. .
步骤503,触发目标安全漏洞扫描应用程序上用于展示登陆页面的控件,以展示目标 安全漏洞扫描应用程序的登陆页面。Step 503: Trigger the control on the target security vulnerability scanning application for displaying the login page to display the target Scan the application's landing page for security vulnerabilities.
进而,RPA机器人可自动触发目标安全漏洞扫描应用程序上用于展示登陆页面的控件,以使目标安全漏洞扫描应用程序展示登陆页面,比如,RPA机器人可双击目标安全漏洞扫描应用程序,从而,目标安全漏洞扫描应用程序可展示登陆页面。Furthermore, the RPA robot can automatically trigger the control for displaying the login page on the target security vulnerability scanning application, so that the target security vulnerability scanning application displays the landing page. For example, the RPA robot can double-click the target security vulnerability scanning application, thereby, the target Security vulnerability scanning applications can display landing pages.
步骤504,在登录页面输入登录信息,以根据登录信息执行登录。Step 504: Enter login information on the login page to perform login based on the login information.
在一些实施例中,在登录页面响应于输入的账户信息,显示设定内容的情况下,触发登录页面上用于获取验证码的控件;通过账户信息关联的即时通信软件接收目标信息;基于NLP技术,提取目标信息中的验证码;在登录页面输入验证码,以根据验证码和账户信息执行登录。In some embodiments, when the login page displays the set content in response to the input account information, the control on the login page for obtaining the verification code is triggered; the target information is received through the instant messaging software associated with the account information; based on NLP Technology to extract the verification code from the target information; enter the verification code on the login page to perform login based on the verification code and account information.
在本公开实施例中,登录信息可以包括账户信息,账户信息可以包括手机号、邮箱号等,可以理解的是,登录信息还可以包括其他信息,比如还可以包括密码信息、图片验证码等,本公开对此并不做限制。In the embodiment of the present disclosure, the login information may include account information, and the account information may include a mobile phone number, an email number, etc. It can be understood that the login information may also include other information, such as password information, picture verification code, etc., This disclosure does not limit this.
需要说明的是,对于图片验证码,可以基于OCR技术,识别图片上的字符,得到图片验证码,从而可以控制RPA机器人在登录页面输入识别得到的图片验证码。It should be noted that for the image verification code, OCR technology can be used to identify the characters on the image and obtain the image verification code, so that the RPA robot can be controlled to enter the recognized image verification code on the login page.
在本公开实施例中,在登录页面响应于输入的登录信息,显示设定内容的情况下,可以控制RPA机器人触发登录页面上用于获取验证码的控件,比如,该控件可以为登录页面上显示的“获取验证码”控件。其中,该设定内容可以用于指示需要验证码登录,例如该设定内容可以为“请输入验证码”。In the embodiment of the present disclosure, when the login page displays the setting content in response to the input login information, the RPA robot can be controlled to trigger the control on the login page for obtaining the verification code. For example, the control can be on the login page. The Get Verification Code control is displayed. The setting content can be used to indicate that a verification code is required to log in. For example, the setting content can be "Please enter the verification code."
在一些实施例中,目标信息可以为包括验证码的信息,安全工程师可通过移动终端中的手机通信卡接收到验证码后,可以在账户信息关联的即时通信软件中输入包括验证码的目标信息,相应的,上述账户信息关联的即时通信软件可以通过聊天机器人(Chatbot)向RPA机器人发送目标信息,应当理解的是,目标信息中可能不仅包含验证码,还可能包含其他字符,比如,目标信息可以为“验证码为:123456”。因此,在本公开实施例中,为了提升验证码获取结果的准确性和可靠性,可以基于自然语言处理NLP技术,提取目标信息中的验证码。In some embodiments, the target information may be information including a verification code. After receiving the verification code through the mobile phone communication card in the mobile terminal, the security engineer can enter the target information including the verification code in the instant messaging software associated with the account information. , Correspondingly, the instant messaging software associated with the above account information can send the target information to the RPA robot through the chatbot (Chatbot). It should be understood that the target information may not only contain the verification code, but also other characters, such as the target information It can be "Verification code is: 123456". Therefore, in the embodiment of the present disclosure, in order to improve the accuracy and reliability of the verification code acquisition results, the verification code in the target information can be extracted based on natural language processing NLP technology.
在一些实施例中,可以基于NLP技术,识别目标信息中是否存在设定个数的连续的数字和/或字符,响应于存在,将识别得到的设定个数的连续的数字和/或字符作为验证码。在一些实施例中,设定个数例如为6,响应于识别目标信息中存在6个连续的数字,将识别得到的“123456”作为验证码。进而,在提取得到验证码后,控制RPA机器人在登录页面输入验证码,以根据验证码和登录信息执行登录。In some embodiments, NLP technology can be used to identify whether there are a set number of consecutive numbers and/or characters in the target information, and in response to the presence, the set number of consecutive numbers and/or characters will be identified. as a verification code. In some embodiments, the number is set to 6, for example. In response to the presence of 6 consecutive numbers in the recognition target information, the recognized "123456" is used as the verification code. Furthermore, after extracting the verification code, the RPA robot is controlled to enter the verification code on the login page to perform login based on the verification code and login information.
步骤505,在安全漏洞扫描应用程序启动成功的情况下,在安全漏洞扫描应用程序中配置目标安全漏洞扫描任务的扫描信息,以根据配置后的扫描信息对目标安全漏洞扫描任 务进行扫描处理。Step 505: When the security vulnerability scanning application is started successfully, configure the scanning information of the target security vulnerability scanning task in the security vulnerability scanning application, so as to perform the target security vulnerability scanning task according to the configured scanning information. Scan and process the task.
需要说明的是,步骤501、步骤505的执行过程可以分别采用本公开的各实施例中的任一种方式实现,本公开实施例并不对此作出限定,也不再赘述。It should be noted that the execution processes of steps 501 and 505 can be implemented in any manner in the embodiments of the present disclosure. The embodiments of the present disclosure do not limit this and will not be described again.
综上,通过在至少一个安全漏洞扫描应用程序中,查询扫描处理的任务类型与主机扫描匹配的目标安全漏洞扫描应用程序;触发目标安全漏洞扫描应用程序上用于展示登陆页面的控件,以展示目标安全漏洞扫描应用程序的登陆页面;在登录页面输入登录信息,以根据登录信息执行登录,由此,RPA机器人可自动启动与任务类型对应的安全漏洞扫描应用程序。In summary, by in at least one security vulnerability scanning application, querying the target security vulnerability scanning application whose task type the scanning process matches the host scan; triggering the control on the target security vulnerability scanning application for displaying the login page to display The login page of the target security vulnerability scanning application; enter the login information on the login page to perform login based on the login information. From this, the RPA robot can automatically start the security vulnerability scanning application corresponding to the task type.
为了进一步提高安全漏洞扫描任务的扫描准确性,如图6所示,图6为本公开实施例所提供的另一种基于RPA和AI的安全漏洞扫描任务处理方法的流程示意图。响应于安全漏洞扫描应用程序根据配置后的扫描信息对目标安全漏洞扫描任务进行扫描处理,RPA机器人对配置后的扫描信息进行验证,以确定配置后的扫描信息是否为空。在配置后的扫描信息为空的情况下,可重新对扫描信息进行配置,图6所示实施例可包括如下步骤601至605。In order to further improve the scanning accuracy of the security vulnerability scanning task, as shown in Figure 6, Figure 6 is a schematic flow chart of another security vulnerability scanning task processing method based on RPA and AI provided by an embodiment of the present disclosure. In response to the security vulnerability scanning application scanning and processing the target security vulnerability scanning task according to the configured scanning information, the RPA robot verifies the configured scanning information to determine whether the configured scanning information is empty. When the configured scanning information is empty, the scanning information can be reconfigured. The embodiment shown in Figure 6 can include the following steps 601 to 605.
步骤601,确定待处理的目标安全漏洞扫描任务的任务类型。Step 601: Determine the task type of the target security vulnerability scanning task to be processed.
步骤602,根据任务类型,启动与任务类型对应的安全漏洞扫描应用程序。Step 602: According to the task type, start the security vulnerability scanning application corresponding to the task type.
步骤603,在安全漏洞扫描应用程序启动成功的情况下,在安全漏洞扫描应用程序中配置目标安全漏洞扫描任务的扫描信息,以根据配置后的扫描信息对目标安全漏洞扫描任务进行扫描处理。Step 603: If the security vulnerability scanning application is successfully started, configure the scanning information of the target security vulnerability scanning task in the security vulnerability scanning application, so as to scan the target security vulnerability scanning task according to the configured scanning information.
步骤604,验证扫描处理所需的各扫描参数是否为空。Step 604: Verify whether each scanning parameter required for scanning processing is empty.
为了提高扫描处理的准确性,在本公开实施例中,在对目标安全漏洞扫描任务进行扫描处理的过程中,RPA机器人可根据扫描处理所需的各个扫描参数,查询配置后的扫描信息中是否存在扫描处理所需的各个扫描参数,以确定配置后的扫描信息中是否缺少扫描处理所需的扫描参数。In order to improve the accuracy of scanning processing, in the embodiment of the present disclosure, during the scanning process of the target security vulnerability scanning task, the RPA robot can query whether the configured scanning information contains There are various scan parameters required for scan processing to determine whether the scan parameters required for scan processing are missing from the configured scan information.
步骤605,在存在至少一个扫描处理所需的扫描参数为空的情况下,重新在安全漏洞扫描应用程序中配置目标安全漏洞扫描任务的扫描信息。Step 605: If at least one scan parameter required for scanning processing is empty, re-configure the scanning information of the target security vulnerability scanning task in the security vulnerability scanning application.
在一些实施例中,响应于配置后的扫描信息中缺少至少一个扫描处理所需的扫描参数,PRA机器人重新在安全漏洞扫描应用程序中配置目标安全漏洞扫描任务的扫描信息。In some embodiments, in response to the lack of at least one scanning parameter required for scanning processing in the configured scanning information, the PRA robot reconfigures the scanning information of the target security vulnerability scanning task in the security vulnerability scanning application.
需要说明的是,步骤601至步骤603的执行过程可以分别采用本公开的各实施例中的任一种方式实现,本公开实施例并不对此作出限定,也不再赘述。It should be noted that the execution process of steps 601 to 603 can be implemented in any manner in the embodiments of the present disclosure. The embodiments of the present disclosure do not limit this and will not be described again.
综上,在存在至少一个扫描处理所需的扫描参数为空的情况下,PRA机器人可重新对扫描信息进行配置,提高了扫描处理的准确性。 In summary, when at least one scanning parameter required for scanning processing is empty, the PRA robot can re-configure the scanning information, which improves the accuracy of scanning processing.
为了让相关人员及时了解到目标安全漏洞扫描任务的处理结果,如图7所示,图7为本公开实施例所提供的另一种基于RPA和AI的安全漏洞扫描任务处理方法的流程示意图。在本公开实施例中,RPA机器人可根据目标安全漏洞扫描任务的处理信息,生成安全漏洞扫描处理信息文件,并将该文件发送至用户端,图7所示实施例可包括如下步骤701至707。In order to allow relevant personnel to promptly understand the processing results of the target security vulnerability scanning task, as shown in Figure 7, Figure 7 is a flow chart of another security vulnerability scanning task processing method based on RPA and AI provided by an embodiment of the present disclosure. In this disclosed embodiment, the RPA robot can generate a security vulnerability scanning processing information file based on the processing information of the target security vulnerability scanning task, and send the file to the user end. The embodiment shown in Figure 7 can include the following steps 701 to 707 .
步骤701,确定待处理的目标安全漏洞扫描任务的任务类型。Step 701: Determine the task type of the target security vulnerability scanning task to be processed.
步骤702,根据任务类型,启动与任务类型对应的安全漏洞扫描应用程序。Step 702: According to the task type, start the security vulnerability scanning application corresponding to the task type.
步骤703,在安全漏洞扫描应用程序启动成功的情况下,在安全漏洞扫描应用程序中配置目标安全漏洞扫描任务的扫描信息,以根据配置后的扫描信息对目标安全漏洞扫描任务进行扫描处理。Step 703: If the security vulnerability scanning application is successfully started, configure the scanning information of the target security vulnerability scanning task in the security vulnerability scanning application, so as to scan the target security vulnerability scanning task according to the configured scanning information.
步骤704,获取目标安全漏洞扫描任务的扫描处理信息。Step 704: Obtain the scanning processing information of the target security vulnerability scanning task.
在本公开实施例中,在目标安全漏洞扫描任务处理完成后,RPA机器人可获取目标安全漏洞扫描任务的扫描处理信息,其中,扫描处理信息中可包括本次扫描处理的安全漏洞数量以及各安全漏洞的描述信息。In this disclosed embodiment, after the target security vulnerability scanning task is processed, the RPA robot can obtain the scanning processing information of the target security vulnerability scanning task, where the scanning processing information can include the number of security vulnerabilities processed in this scanning and each security vulnerability. Description of the vulnerability.
步骤705,基于光学字符识别技术OCR,识别扫描处理信息中安全漏洞的数量以及各安全漏洞的描述信息。Step 705: Based on the optical character recognition technology OCR, identify the number of security vulnerabilities in the scanned processing information and the description information of each security vulnerability.
步骤706,根据安全漏洞的数量以及至少一个安全漏洞的描述信息,生成安全漏洞扫描处理信息文件。Step 706: Generate a security vulnerability scanning processing information file based on the number of security vulnerabilities and the description information of at least one security vulnerability.
为了便于RPA机器人根据安全漏洞的数量以及各安全漏洞的描述信息自动编写安全漏洞扫描处理信息文件,在本公开实施例中,可基于OCR,识别出扫描处理信息中安全漏洞的数量以及各安全漏洞的描述信息,RPA机器人可自动触发Word组件完成安全漏洞扫描处理信息文件的编写。In order to facilitate the RPA robot to automatically compile the security vulnerability scanning processing information file according to the number of security vulnerabilities and the description information of each security vulnerability, in the embodiment of the present disclosure, the number of security vulnerabilities and each security vulnerability in the scanning processing information can be identified based on OCR. Based on the description information, the RPA robot can automatically trigger the Word component to complete the writing of security vulnerability scanning and processing information files.
步骤707,将安全漏洞扫描处理信息文件发送至用户端。Step 707: Send the security vulnerability scanning processing information file to the client.
在一些实施例中,RPA机器人可触发用于发送安全漏洞扫描处理信息文件的控件(如,邮箱),以将安全漏洞扫描处理信息文件发送至用户端,以便相关人员进行查看。In some embodiments, the RPA robot can trigger a control (such as a mailbox) for sending the security vulnerability scanning processing information file to send the security vulnerability scanning processing information file to the user terminal for review by relevant personnel.
需要说明的是,步骤701至步骤703的执行过程可以分别采用本公开的各实施例中的任一种方式实现,本公开实施例并不对此作出限定,也不再赘述。It should be noted that the execution process of steps 701 to 703 can be implemented in any manner in the embodiments of the present disclosure. The embodiments of the present disclosure do not limit this and will not be described again.
综上,通过获取目标安全漏洞扫描任务的扫描处理信息;基于光学字符识别技术OCR,识别扫描处理信息中安全漏洞的数量以及各安全漏洞的描述信息;基于光学字符识别技术OCR,识别扫描处理信息中安全漏洞的数量以及各安全漏洞的描述信息;根据安全漏洞的数量以及至少一个安全漏洞的描述信息,生成安全漏洞扫描处理信息文件,由此,RPA机器人可自动编写安全漏洞扫描处理信息文件,并将安全漏洞扫描处理信息文件自动发送到用户端,节省了人力成本。 In summary, by obtaining the scanning processing information of the target security vulnerability scanning task; based on the optical character recognition technology OCR, identify the number of security vulnerabilities in the scanning processing information and the description information of each security vulnerability; based on the optical character recognition technology OCR, identify the scanning processing information The number of security vulnerabilities and the description information of each security vulnerability; based on the number of security vulnerabilities and the description information of at least one security vulnerability, a security vulnerability scanning processing information file is generated. From this, the RPA robot can automatically write a security vulnerability scanning processing information file. And the security vulnerability scanning processing information file is automatically sent to the user end, saving labor costs.
为了清楚的说明上述实施例,现举例进行说明。In order to clearly illustrate the above embodiments, examples are given.
举例而言,比如,以任务类型为主机扫描为例,如图8所示,包括:第一步,RPA机器人使用鼠标键盘模拟人工操作实现自动输入用户名和密码,使用OCR识别和键盘自动输入验证码,实现主机扫描系统的登录,其中,需要说明的是,在RPA机器人登录主机扫描系统之前,可先对RPA机器人进行初始化,以确定RPA机器人可以正常使用;For example, if the task type is host scanning, as shown in Figure 8, it includes: In the first step, the RPA robot uses the mouse and keyboard to simulate manual operations to automatically enter user names and passwords, and uses OCR recognition and keyboard automatic input verification. code to realize the login of the host scanning system. It should be noted that before the RPA robot logs in to the host scanning system, the RPA robot can be initialized first to ensure that the RPA robot can be used normally;
第二步,RPA机器人使用鼠标模拟点击功能菜单“扫描任务-主机扫描”,打开“主机扫描”页面;In the second step, the RPA robot uses the mouse to simulate clicking on the function menu "Scan Task-Host Scan" to open the "Host Scan" page;
第三步,如图9所示,RPA机器人模拟鼠标点击“新建”按钮,打开主机扫描新建任务页面;In the third step, as shown in Figure 9, the RPA robot simulates a mouse click on the "New" button to open the host scanning new task page;
第四步,RPA机器人模拟鼠标键盘可将自动获取的系统时间输入至任务名称栏、将自动读取Excel文件中的IP地址列表输入到扫描目标栏;In the fourth step, the RPA robot simulates the mouse and keyboard to input the automatically obtained system time into the task name column and the IP address list automatically read from the Excel file into the scan target column;
第五步,RPA机器人模拟鼠标自动点击关闭“是否忽视高风险漏洞防止设备异常”项;In the fifth step, the RPA robot simulates a mouse click and automatically closes the item "Whether to ignore high-risk vulnerabilities to prevent device abnormalities";
第六步,RPA机器人模拟鼠标点击“下一步”;Step 6: The RPA robot simulates a mouse click on "Next";
第七步,如图10所示,RPA机器人模拟鼠标点击“提交”开始主机逐一扫描,并在扫描过程中,如图11所示,RPA机器人还可查看各主机扫描任务的扫描进度;和The seventh step, as shown in Figure 10, the RPA robot simulates the mouse click "Submit" to start scanning the hosts one by one, and during the scanning process, as shown in Figure 11, the RPA robot can also check the scanning progress of each host scanning task; and
第八步,扫描完成后导出主机扫描结果报表。Step 8: After the scan is completed, export the host scan results report.
需要说明的是,RPA机器人还可对输入的扫描参数进行验证,比如,任务名称、自动读取Excel文件中的IP地址列表进行验证,在存在至少一个扫描处理所需的扫描参数为空的情况下,重新在安全漏洞扫描应用程序中配置所述目标安全漏洞扫描任务的扫描信息。It should be noted that the RPA robot can also verify the input scanning parameters, such as the task name and automatically read the IP address list in the Excel file for verification. If at least one of the scanning parameters required for scanning processing is empty, Next, reconfigure the scanning information of the target security vulnerability scanning task in the security vulnerability scanning application.
又比如,以任务类型为网站扫描为例,如图12所示,包括:第一步,RPA机器人自动启动扫描工具“XXAPP”,其中,需要说明的是,在RPA机器人登录主机扫描系统之前,可先对RPA机器人进行初始化,以确定RPA机器人可以正常使用;For another example, take the task type of website scanning as an example, as shown in Figure 12, including: In the first step, the RPA robot automatically starts the scanning tool "XXAPP". It should be noted that before the RPA robot logs in to the host scanning system, You can initialize the RPA robot first to ensure that the RPA robot can be used normally;
第二步,如图13所示,RPA机器人自动点击“文件-新建”,打开网站扫描任务新建界面;In the second step, as shown in Figure 13, the RPA robot automatically clicks "File-New" to open the new website scanning task interface;
第三步,RPA机器人自动点击“扫描web应用程序”,打开新建任务向导;In the third step, the RPA robot automatically clicks "Scan web application" to open the new task wizard;
第四步,如图14所示,RPA机器人自动在弹出的消息对话框输入需要扫描的网站域名或网站IP;The fourth step, as shown in Figure 14, the RPA robot automatically enters the website domain name or website IP that needs to be scanned in the pop-up message dialog box;
第五步,RPA机器人自动点击“下一步”;In the fifth step, the RPA robot automatically clicks "Next";
第六步,如图15所示,RPA机器人先后自动点击“是”和“下一步”;In the sixth step, as shown in Figure 15, the RPA robot automatically clicks "Yes" and "Next" successively;
第七步,如图16所示,RPA机器人自动点击“下一步”;In the seventh step, as shown in Figure 16, the RPA robot automatically clicks "Next";
第八步,如图17所示,RPA机器人自动点击“下一步”;和Step 8, as shown in Figure 17, the RPA robot automatically clicks "Next"; and
第九步,如图18和图19所示,先后自动点击“完成”和“否”,启动网站扫描。 The ninth step, as shown in Figure 18 and Figure 19, automatically click "Finish" and "No" successively to start the website scan.
由此,RPA机器人可完成取代人工的主机扫描任务新建及启动扫描的一系列操作,提高了扫描处理效率,比如,800个主机IP的扫描任务RPA机器人可以在50秒内完成创建并开始执行;又比如,RPA机器人能在40秒内自动完成网站扫描任务创建及网站扫描任务启动。As a result, the RPA robot can complete a series of operations that replace manual creation of host scanning tasks and start scanning, improving the efficiency of scanning processing. For example, the RPA robot can complete the creation and start execution of a scanning task of 800 host IPs in 50 seconds; For another example, the RPA robot can automatically complete the creation of website scanning tasks and start the website scanning tasks within 40 seconds.
本公开实施例的基于RPA和AI的安全漏洞扫描任务处理方法,通过确定待处理的目标安全漏洞扫描任务的任务类型;根据任务类型,启动与任务类型对应的安全漏洞扫描应用程序;在安全漏洞扫描应用程序启动成功的情况下,在安全漏洞扫描应用程序中配置目标安全漏洞扫描任务的扫描信息,以根据配置后的扫描信息对目标安全漏洞扫描任务进行扫描处理,由此,通过RPA机器人自动启动与目标安全漏洞扫描任务的任务类型对应的安全漏洞扫描应用程序,并在该安全漏洞扫描应用程序中自动配置目标安全漏洞扫描任务的扫描信息,以使安全漏洞扫描应用程序对目标安全漏洞扫描任务进行扫描处理,无需人工频繁且步骤固定重复的操作进行安全漏洞扫描任务的扫描处理,节省了人力成本,提高了扫描处理效率,可使安全工程师从枯燥重复的工作中解脱出来,投入到更高价值的工作中。The security vulnerability scanning task processing method based on RPA and AI in the embodiment of the present disclosure determines the task type of the target security vulnerability scanning task to be processed; according to the task type, starts the security vulnerability scanning application corresponding to the task type; in the security vulnerability When the scanning application is started successfully, the scanning information of the target security vulnerability scanning task is configured in the security vulnerability scanning application, so that the target security vulnerability scanning task is scanned and processed based on the configured scanning information. Thus, the RPA robot automatically Start a security vulnerability scanning application corresponding to the task type of the target security vulnerability scanning task, and automatically configure the scanning information of the target security vulnerability scanning task in the security vulnerability scanning application, so that the security vulnerability scanning application scans the target security vulnerability The task is scanned and processed without the need for frequent manual operations with fixed and repeated steps to scan and process security vulnerability scanning tasks, which saves labor costs and improves the efficiency of scanning processing, freeing security engineers from boring and repetitive work and investing in more work. High value work.
与上述图3至图19实施例提供的基于RPA和AI的安全漏洞扫描任务处理方法相对应,本公开实施例还提供一种基于RPA和AI的安全漏洞扫描任务处理装置,由于本公开实施例提供的基于RPA和AI的安全漏洞扫描任务处理装置与上述图3至图19实施例提供的基于RPA和AI的安全漏洞扫描任务处理方法相对应,因此在基于RPA和AI的安全漏洞扫描任务处理方法的实施方式也适用于本公开实施例提供的基于RPA和AI的安全漏洞扫描任务处理装置,在本公开实施例中不再详细描述。Corresponding to the security vulnerability scanning task processing method based on RPA and AI provided by the above embodiments of FIG. 3 to FIG. 19 , the embodiment of the present disclosure also provides a security vulnerability scanning task processing device based on RPA and AI. Due to the embodiment of the present disclosure The provided security vulnerability scanning task processing device based on RPA and AI corresponds to the security vulnerability scanning task processing method based on RPA and AI provided in the above embodiments of Figures 3 to 19. Therefore, in the security vulnerability scanning task processing based on RPA and AI The implementation of the method is also applicable to the security vulnerability scanning task processing device based on RPA and AI provided in the embodiment of the present disclosure, and will not be described in detail in the embodiment of the present disclosure.
图20为本公开实施例提供的一种基于RPA和AI的安全漏洞扫描任务处理装置的结构示意图。Figure 20 is a schematic structural diagram of a security vulnerability scanning task processing device based on RPA and AI provided by an embodiment of the present disclosure.
如图20所示,该基于RPA和AI的安全漏洞扫描任务处理装置2000应用于RPA机器人,包括:确定模块2010、启动模块2020和处理模块2030。As shown in Figure 20, the security vulnerability scanning task processing device 2000 based on RPA and AI is applied to the RPA robot and includes: a determination module 2010, a startup module 2020 and a processing module 2030.
其中,确定模块,用于确定待处理的目标安全漏洞扫描任务的任务类型;启动模块2020,用于根据任务类型,启动与任务类型对应的安全漏洞扫描应用程序;处理模块2030,用于在安全漏洞扫描应用程序启动成功的情况下,在安全漏洞扫描应用程序中配置目标安全漏洞扫描任务的扫描信息,以根据配置后的扫描信息对目标安全漏洞扫描任务进行扫描处理。Among them, the determination module is used to determine the task type of the target security vulnerability scanning task to be processed; the startup module 2020 is used to start the security vulnerability scanning application corresponding to the task type according to the task type; the processing module 2030 is used to perform the security vulnerability scanning When the vulnerability scanning application is started successfully, configure the scanning information of the target security vulnerability scanning task in the security vulnerability scanning application, so that the target security vulnerability scanning task is scanned and processed based on the configured scanning information.
在一些实施例中,处理模块2030,还用于:安全漏洞扫描应用程序启动成功的情况下,触发安全漏洞扫描应用程序中用于新建目标安全漏洞扫描任务页面的控件,以新建与任务类型对应的目标安全漏洞扫描任务页面;目标安全漏洞扫描任务页面新建成功的情况下,在目标安全漏洞扫描任务页面,输入与目标安全漏洞扫描任务对应的扫描参数;在设置节点状态为扫描参数输入完成的情况下,触发安全漏洞扫描应用程序中用于扫描目标安全漏 洞扫描任务的控件,以根据扫描参数对目标安全漏洞扫描任务进行扫描处理。In some embodiments, the processing module 2030 is also used to: when the security vulnerability scanning application is started successfully, trigger the control in the security vulnerability scanning application for creating a target security vulnerability scanning task page to create a new task corresponding to the task type. The target security vulnerability scanning task page; if the target security vulnerability scanning task page is successfully created, on the target security vulnerability scanning task page, enter the scanning parameters corresponding to the target security vulnerability scanning task; in the setting node status, the scanning parameter input is completed In case of triggering security vulnerability scanning application is used to scan target security vulnerabilities Control of the hole scanning task to scan and process the target security vulnerability scanning task according to the scanning parameters.
在一些实施例中,基于RPA和AI的安全漏洞扫描任务处理装置2000还包括:第一获取模块和提取模块。In some embodiments, the security vulnerability scanning task processing device 2000 based on RPA and AI also includes: a first acquisition module and an extraction module.
其中,第一获取模块,用于根据任务类型,获取与任务类型匹配的目标文件;提取模块,用于基于自然语言处理NLP技术,从目标文件中提取与目标安全漏洞扫描任务对应的扫描参数。Among them, the first acquisition module is used to acquire the target file matching the task type according to the task type; the extraction module is used to extract the scanning parameters corresponding to the target security vulnerability scanning task from the target file based on natural language processing NLP technology.
在一些实施例中,任务类型为主机扫描,启动模块2020还用于:在至少一个安全漏洞扫描应用程序中,查询扫描处理的任务类型与主机扫描匹配的目标安全漏洞扫描应用程序;触发目标安全漏洞扫描应用程序上用于展示登陆页面的控件,以展示目标安全漏洞扫描应用程序的登陆页面;在登录页面输入登录信息,以根据登录信息执行登录。In some embodiments, the task type is host scanning, and the startup module 2020 is further configured to: in at least one security vulnerability scanning application, query the target security vulnerability scanning application whose task type matched with the host scanning; trigger the target security vulnerability scanning application. A control on the vulnerability scanning application used to display the login page to display the login page of the target security vulnerability scanning application; enter login information on the login page to perform login based on the login information.
在一些实施例中,登录信息包括账户信息和验证码,启动模块2020还用于:在登录页面响应于输入的账户信息,显示设定内容的情况下,触发登录页面上用于获取验证码的控件;通过账户信息关联的即时通信软件接收目标信息;基于自然语言处理NLP技术,提取目标信息中的验证码;在登录页面输入验证码,以根据验证码和账户信息执行登录。In some embodiments, the login information includes account information and verification code, and the startup module 2020 is also configured to: trigger the login page for obtaining the verification code when the login page displays the setting content in response to the input account information. Control; receive target information through instant messaging software associated with account information; extract the verification code in the target information based on natural language processing NLP technology; enter the verification code on the login page to perform login based on the verification code and account information.
在一些实施例中,基于RPA和AI的安全漏洞扫描任务处理装置2000还包括:验证模块和设置模块。In some embodiments, the security vulnerability scanning task processing device 2000 based on RPA and AI also includes: a verification module and a setting module.
其中,验证模块,用于验证扫描处理所需的各扫描参数是否为空;设置模块,用于在存在至少一个扫描处理所需的扫描参数为空的情况下,重新在安全漏洞扫描应用程序中配置目标安全漏洞扫描任务的扫描信息。Among them, the verification module is used to verify whether each scanning parameter required for scanning processing is empty; the setting module is used to re-enter the security vulnerability scanning application when at least one scanning parameter required for scanning processing is empty. Configure the scanning information of the target security vulnerability scanning task.
在一些实施例中,基于RPA和AI的安全漏洞扫描任务处理装置2000还包括:第二获取模块、识别模块、生成模块和发送模块。In some embodiments, the security vulnerability scanning task processing device 2000 based on RPA and AI also includes: a second acquisition module, an identification module, a generation module and a sending module.
其中,第二获取模块,还用于获取目标安全漏洞扫描任务的扫描处理信息;识别模块,用于基于光学字符识别技术OCR,识别扫描处理信息中安全漏洞的数量以及各安全漏洞的描述信息;生成模块,用于根据安全漏洞的数量以及至少一个安全漏洞的描述信息,生成安全漏洞扫描处理信息文件;发送模块,用于将安全漏洞扫描处理信息文件发送至用户端。Among them, the second acquisition module is also used to obtain the scanning processing information of the target security vulnerability scanning task; the identification module is used to identify the number of security vulnerabilities in the scanning processing information and the description information of each security vulnerability based on the optical character recognition technology OCR; The generation module is used to generate a security vulnerability scanning processing information file based on the number of security vulnerabilities and the description information of at least one security vulnerability; the sending module is used to send the security vulnerability scanning processing information file to the user end.
本公开实施例的基于RPA和AI的安全漏洞扫描任务处理装置,应用于RPA机器人,通过确定待处理的目标安全漏洞扫描任务的任务类型;根据任务类型,启动与任务类型对应的安全漏洞扫描应用程序;在安全漏洞扫描应用程序启动成功的情况下,在安全漏洞扫描应用程序中配置目标安全漏洞扫描任务的扫描信息,以根据配置后的扫描信息对目标安全漏洞扫描任务进行扫描处理,由此,通过RPA机器人自动启动与目标安全漏洞扫描任务的任务类型对应的安全漏洞扫描应用程序,并在该安全漏洞扫描应用程序中自动配置目标安全漏洞扫描任务的扫描信息,以使安全漏洞扫描应用程序对目标安全漏洞扫描任务进行 扫描处理,无需人工频繁且步骤固定重复的操作进行安全漏洞扫描任务的扫描处理,节省了人力成本,提高了扫描处理效率,可使安全工程师从枯燥重复的工作中解脱出来,投入到更高价值的工作中。The security vulnerability scanning task processing device based on RPA and AI in the embodiment of the present disclosure is applied to the RPA robot and determines the task type of the target security vulnerability scanning task to be processed; according to the task type, the security vulnerability scanning application corresponding to the task type is started. program; when the security vulnerability scanning application is started successfully, configure the scanning information of the target security vulnerability scanning task in the security vulnerability scanning application, so as to scan and process the target security vulnerability scanning task according to the configured scanning information, thus , the RPA robot automatically starts the security vulnerability scanning application corresponding to the task type of the target security vulnerability scanning task, and automatically configures the scanning information of the target security vulnerability scanning task in the security vulnerability scanning application, so that the security vulnerability scanning application Conduct scanning tasks for target security vulnerabilities Scanning processing eliminates the need for frequent manual operations with fixed and repetitive steps to perform scanning processing of security vulnerability scanning tasks, saving labor costs and improving scanning processing efficiency, which can free security engineers from boring and repetitive work and invest in higher value at work.
为了实现上述实施例,本公开实施例还提出一种电子设备,包括存储器、处理器及存储在存储器上并可在处理器上运行的计算机程序,所述处理器执行所述计算机程序时,实现如前述任一方法实施例所述的基于RPA和AI的安全漏洞扫描任务处理方法。In order to implement the above embodiments, embodiments of the present disclosure also provide an electronic device, including a memory, a processor, and a computer program stored in the memory and executable on the processor. When the processor executes the computer program, The security vulnerability scanning task processing method based on RPA and AI is as described in any of the foregoing method embodiments.
为了实现上述实施例,本公开实施例还提出一种非临时性计算机可读存储介质,其上存储有计算机程序,该计算机程序被处理器执行时实现如前述任一方法实施例所述的基于RPA和AI的安全漏洞扫描任务处理方法。In order to implement the above embodiments, embodiments of the present disclosure also provide a non-transitory computer-readable storage medium on which a computer program is stored. When the computer program is executed by a processor, the method described in any of the foregoing method embodiments is implemented based on RPA and AI security vulnerability scanning task processing methods.
为了实现上述实施例,本公开实施例还提出一种计算机程序产品,当所述计算机程序产品中的指令处理器执行时,实现如前述任一方法实施例所述的基于RPA和AI的安全漏洞扫描任务处理方法。In order to implement the above embodiments, embodiments of the present disclosure also provide a computer program product. When the instruction processor in the computer program product is executed, the security vulnerability based on RPA and AI as described in any of the foregoing method embodiments is realized. Scan task processing method.
为了实现上述实施例,本公开实施例还提出一种计算机程序,所述计算机程序包括计算机程序代码,当所述计算机程序代码在计算机上运行时,使得计算机执行如前述任一方法实施例所述的基于RPA和AI的安全漏洞扫描任务处理方法。In order to implement the above embodiments, an embodiment of the present disclosure also proposes a computer program. The computer program includes computer program code. When the computer program code is run on a computer, it causes the computer to execute as described in any of the foregoing method embodiments. Security vulnerability scanning task processing method based on RPA and AI.
为了实现上述实施例,本公开实施例还提出一种电子设备,如图21所示,图21是根据本公开实施例示出的一种用于基于RPA和AI的安全漏洞扫描任务处理方法的电子设备的框图。In order to implement the above embodiments, embodiments of the present disclosure also provide an electronic device, as shown in Figure 21. Figure 21 is an electronic device for a security vulnerability scanning task processing method based on RPA and AI according to an embodiment of the disclosure. Block diagram of the device.
如图21所示,上述电子设备2100包括:As shown in Figure 21, the above-mentioned electronic device 2100 includes:
存储器2110及处理器2120,连接不同组件(包括存储器2110和处理器2120)的总线2130,存储器2110存储有计算机程序,当处理器2120执行所述程序时实现本公开实施例所述的基于RPA和AI的安全漏洞扫描任务处理方法。The memory 2110 and the processor 2120 are connected to the bus 2130 of different components (including the memory 2110 and the processor 2120). The memory 2110 stores a computer program. When the processor 2120 executes the program, the RPA-based and AI security vulnerability scanning task processing method.
总线2130表示几类总线结构中的一种或多种,包括存储器总线或者存储器控制器,外围总线,图形加速端口,处理器或者使用多种总线结构中的任意总线结构的局域总线。举例来说,这些体系结构包括但不限于工业标准体系结构(ISA)总线,微通道体系结构(MAC)总线,增强型ISA总线、视频电子标准协会(VESA)局域总线以及外围组件互连(PCI)总线。Bus 2130 represents one or more of several types of bus structures, including a memory bus or memory controller, a peripheral bus, a graphics accelerated port, a processor, or a local bus using any of a variety of bus structures. For example, these architectures include, but are not limited to, the Industry Standard Architecture (ISA) bus, the Micro Channel Architecture (MAC) bus, the Enhanced ISA bus, the Video Electronics Standards Association (VESA) local bus, and the Peripheral Component Interconnect ( PCI) bus.
电子设备2100典型地包括多种电子设备可读介质。这些介质可以是任何能够被电子设备2100访问的可用介质,包括易失性和非易失性介质,可移动的和不可移动的介质。Electronic device 2100 typically includes a variety of electronic device-readable media. These media can be any available media that can be accessed by electronic device 2100, including volatile and nonvolatile media, removable and non-removable media.
存储器2110还可以包括易失性存储器形式的计算机系统可读介质,例如随机存取存储器(RAM)2140和/或高速缓存存储器2150。电子设备2100可以进一步包括其它可移动/不可移动的、易失性/非易失性计算机系统存储介质。仅作为举例,存储系统2160可以用 于读写不可移动的、非易失性磁介质(图21未显示,通常称为“硬盘驱动器”)。尽管图21中未示出,可以提供用于对可移动非易失性磁盘(例如“软盘”)读写的磁盘驱动器,以及对可移动非易失性光盘(例如CD-ROM,DVD-ROM或者其它光介质)读写的光盘驱动器。在这些情况下,每个驱动器可以通过一个或者多个数据介质接口与总线2130相连。存储器2110可以包括至少一个程序产品,该程序产品具有一组(例如至少一个)程序模块,这些程序模块被配置以执行本公开各实施例的功能。Memory 2110 may also include computer system readable media in the form of volatile memory, such as random access memory (RAM) 2140 and/or cache memory 2150. Electronic device 2100 may further include other removable/non-removable, volatile/non-volatile computer system storage media. By way of example only, storage system 2160 may use For reading and writing non-removable, non-volatile magnetic media (not shown in Figure 21, often called a "hard drive"). Although not shown in FIG. 21, a disk drive for reading and writing removable non-volatile disks (e.g., "floppy disks"), and removable non-volatile optical disks (e.g., CD-ROM, DVD-ROM) may be provided. or other optical media) that can read and write optical disc drives. In these cases, each drive may be connected to bus 2130 through one or more data media interfaces. Memory 2110 may include at least one program product having a set (eg, at least one) of program modules configured to perform the functions of embodiments of the present disclosure.
具有一组(至少一个)程序模块2170的程序/实用工具2180,可以存储在例如存储器2110中,这样的程序模块2170包括但不限于操作系统、一个或者多个应用程序、其它程序模块以及程序数据,这些实施例中的每一个或某种组合中可能包括网络环境的实现。程序模块2170通常执行本公开实施例中所描述的功能和/或方法。A program/utility 2180 having a set of (at least one) program modules 2170, including but not limited to an operating system, one or more application programs, other program modules, and program data, may be stored, for example, in memory 2110 , each of these embodiments or some combination may include the implementation of a network environment. Program modules 2170 generally perform the functions and/or methods described in embodiments of the present disclosure.
电子设备2100也可以与一个或多个外部设备2190(例如键盘、指向设备、显示器等)通信,还可与一个或者多个使得用户能与该电子设备2100交互的设备通信,和/或与使得该电子设备2100能与一个或多个其它计算设备进行通信的任何设备(例如网卡,调制解调器等等)通信。这种通信可以通过输入/输出(I/O)接口2192进行。并且,电子设备2100还可以通过网络适配器2193与一个或者多个网络(例如局域网(LAN),广域网(WAN)和/或公共网络,例如因特网)通信。如图21所示,网络适配器2193通过总线2130与电子设备2100的其它模块通信。应当明白,尽管图21中未示出,可以结合电子设备2100使用其它硬件和/或软件模块,包括但不限于:微代码、设备驱动器、冗余处理单元、外部磁盘驱动阵列、RAID系统、磁带驱动器以及数据备份存储系统等。Electronic device 2100 may also communicate with one or more external devices 2190 (e.g., keyboard, pointing device, display, etc.), with one or more devices that enable a user to interact with electronic device 2100, and/or with The electronic device 2100 can communicate with any device (eg, network card, modem, etc.) that communicates with one or more other computing devices. This communication may occur through input/output (I/O) interface 2192. Furthermore, the electronic device 2100 may also communicate with one or more networks (eg, a local area network (LAN), a wide area network (WAN), and/or a public network, such as the Internet) through a network adapter 2193. As shown in Figure 21, network adapter 2193 communicates with other modules of electronic device 2100 through bus 2130. It should be understood that, although not shown in Figure 21, other hardware and/or software modules may be used in conjunction with electronic device 2100, including but not limited to: microcode, device drivers, redundant processing units, external disk drive arrays, RAID systems, tapes drives and data backup storage systems, etc.
处理器2120通过运行存储在存储器2110中的程序,从而执行各种功能应用以及数据处理。The processor 2120 executes various functional applications and data processing by running programs stored in the memory 2110 .
需要说明的是,本实施例的电子设备的实施过程和技术原理参见图3至图19对本公开实施例的基于RPA和AI的安全漏洞扫描任务处理的解释说明,此处不再赘述。It should be noted that for the implementation process and technical principles of the electronic device of this embodiment, please refer to the explanation of the security vulnerability scanning task processing based on RPA and AI in the embodiment of the present disclosure in FIG. 3 to FIG. 19 , and will not be described again here.
需要说明的是,前述对基于RPA和AI的安全漏洞扫描任务处理方法实施例的解释说明也适用于本公开实施例的电子设备、计算机可读存储介质、计算机程序产品和计算机程序,此处不再赘述。本公开所有实施例均可以单独被执行,也可以与其他实施例相结合被执行,均视为本公开要求的保护范围。It should be noted that the foregoing explanations of the embodiments of the security vulnerability scanning task processing method based on RPA and AI are also applicable to the electronic devices, computer-readable storage media, computer program products and computer programs of the embodiments of the present disclosure, and are not included here. Again. All embodiments of the present disclosure can be executed alone or in combination with other embodiments, which are considered to be within the scope of protection claimed by the present disclosure.
在本说明书的描述中,参考术语“一个实施例”、“一些实施例”、“示例”、“具体示例”、或“一些示例”等的描述意指结合该实施例或示例描述的具体特征、结构、材料或者特点包含于本公开的至少一个实施例或示例中。在本说明书中,对上述术语的示意性表述不必须针对的是相同的实施例或示例。而且,描述的具体特征、结构、材料或者特点可以在任一个或多个实施例或示例中以合适的方式结合。此外,在不相互矛盾的情况下,本领域的 技术人员可以将本说明书中描述的不同实施例或示例以及不同实施例或示例的特征进行结合和组合。In the description of this specification, reference to the terms "one embodiment,""someembodiments,""anexample,""specificexamples," or "some examples" or the like means that specific features are described in connection with the embodiment or example. , structures, materials, or features are included in at least one embodiment or example of the present disclosure. In this specification, the schematic expressions of the above terms are not necessarily directed to the same embodiment or example. Furthermore, the specific features, structures, materials or characteristics described may be combined in any suitable manner in any one or more embodiments or examples. Furthermore, to the extent not contradictory, the knowledge in the art The skilled person may combine and combine the different embodiments or examples described in this specification and the features of the different embodiments or examples.
此外,术语“第一”、“第二”仅用于描述目的,而不能理解为指示或暗示相对重要性或者隐含指明所指示的技术特征的数量。由此,限定有“第一”、“第二”的特征可以明示或者隐含地包括至少一个该特征。在本公开的描述中,“多个”的含义是至少两个,例如两个,三个等,除非另有明确具体的限定。In addition, the terms “first” and “second” are used for descriptive purposes only and cannot be understood as indicating or implying relative importance or implicitly indicating the quantity of indicated technical features. Therefore, features defined as "first" and "second" may explicitly or implicitly include at least one of these features. In the description of the present disclosure, "plurality" means at least two, such as two, three, etc., unless otherwise expressly and specifically limited.
流程图中或在此以其他方式描述的任何过程或方法描述可以被理解为,表示包括一个或更多个用于实现定制逻辑功能或过程的步骤的可执行指令的代码的模块、片段或部分,并且本公开的优选实施方式的范围包括另外的实现,其中可以不按所示出或讨论的顺序,包括根据所涉及的功能按基本同时的方式或按相反的顺序,来执行功能,这应被本公开的实施例所属技术领域的技术人员所理解。Any process or method descriptions in flowcharts or otherwise described herein may be understood to represent modules, segments, or portions of code that include one or more executable instructions for implementing customized logical functions or steps of the process. , and the scope of the preferred embodiments of the present disclosure includes additional implementations in which functions may be performed out of the order shown or discussed, including in a substantially simultaneous manner or in the reverse order, depending on the functionality involved, which shall It should be understood by those skilled in the art to which embodiments of the present disclosure belong.
在流程图中表示或在此以其他方式描述的逻辑和/或步骤,例如,可以被认为是用于实现逻辑功能的可执行指令的定序列表,可以具体实现在任何计算机可读介质中,以供指令执行系统、装置或设备(如基于计算机的系统、包括处理器的系统或其他可以从指令执行系统、装置或设备取指令并执行指令的系统)使用,或结合这些指令执行系统、装置或设备而使用。就本说明书而言,"计算机可读介质"可以是任何可以包含、存储、通信、传播或传输程序以供指令执行系统、装置或设备或结合这些指令执行系统、装置或设备而使用的装置。计算机可读介质的更具体的示例(非穷尽性列表)包括以下:具有一个或多个布线的电连接部(电子装置),便携式计算机盘盒(磁装置),随机存取存储器(RAM),只读存储器(ROM),可擦除可编辑只读存储器(EPROM或闪速存储器),光纤装置,以及便携式光盘只读存储器(CDROM)。另外,计算机可读介质甚至可以是可在其上打印所述程序的纸或其他合适的介质,因为可以例如通过对纸或其他介质进行光学扫描,接着进行编辑、解译或必要时以其他合适方式进行处理来以电子方式获得所述程序,然后将其存储在计算机存储器中。The logic and/or steps represented in the flowcharts or otherwise described herein, for example, may be considered a sequenced list of executable instructions for implementing the logical functions, and may be embodied in any computer-readable medium, For use by, or in combination with, instruction execution systems, devices or devices (such as computer-based systems, systems including processors or other systems that can fetch instructions from and execute instructions from the instruction execution system, device or device) or equipment. For the purposes of this specification, a "computer-readable medium" may be any device that can contain, store, communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. More specific examples (non-exhaustive list) of computer readable media include the following: electrical connections with one or more wires (electronic device), portable computer disk cartridges (magnetic device), random access memory (RAM), Read-only memory (ROM), erasable and programmable read-only memory (EPROM or flash memory), fiber optic devices, and portable compact disc read-only memory (CDROM). Additionally, the computer-readable medium may even be paper or other suitable medium on which the program may be printed, as the paper or other medium may be optically scanned, for example, and subsequently edited, interpreted, or otherwise suitable as necessary. process to obtain the program electronically and then store it in computer memory.
应当理解,本公开的各部分可以用硬件、软件、固件或它们的组合来实现。在上述实施方式中,多个步骤或方法可以用存储在存储器中且由合适的指令执行系统执行的软件或固件来实现。如,如果用硬件来实现和在另一实施方式中一样,可用本领域公知的下列技术中的任一项或他们的组合来实现:具有用于对数据信号实现逻辑功能的逻辑门电路的离散逻辑电路,具有合适的组合逻辑门电路的专用集成电路,可编程门阵列(PGA),现场可编程门阵列(FPGA)等。It should be understood that various parts of the present disclosure may be implemented in hardware, software, firmware, or combinations thereof. In the above-described embodiments, various steps or methods may be implemented in software or firmware stored in a memory and executed by a suitable instruction execution system. For example, if it is implemented in hardware, as in another embodiment, it can be implemented by any one of the following technologies known in the art or their combination: discrete logic gate circuits with logic functions for implementing data signals; Logic circuits, application specific integrated circuits with suitable combinational logic gates, programmable gate arrays (PGA), field programmable gate arrays (FPGA), etc.
本技术领域的普通技术人员可以理解实现上述实施例方法携带的全部或部分步骤是可以通过程序来指令相关的硬件完成,所述的程序可以存储于一种计算机可读存储介质中, 该程序在执行时,包括方法实施例的步骤之一或其组合。Those of ordinary skill in the art can understand that all or part of the steps involved in implementing the method of the above embodiments can be completed by instructing relevant hardware through a program, and the program can be stored in a computer-readable storage medium. When executed, the program includes one of the steps of the method embodiment or a combination thereof.
此外,在本公开各个实施例中的各功能单元可以集成在一个处理模块中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个模块中。上述集成的模块既可以采用硬件的形式实现,也可以采用软件功能模块的形式实现。所述集成的模块如果以软件功能模块的形式实现并作为独立的产品销售或使用时,也可以存储在一个计算机可读取存储介质中。In addition, each functional unit in various embodiments of the present disclosure may be integrated into one processing module, each unit may exist physically alone, or two or more units may be integrated into one module. The above integrated modules can be implemented in the form of hardware or software function modules. If the integrated module is implemented in the form of a software function module and sold or used as an independent product, it can also be stored in a computer-readable storage medium.
上述提到的存储介质可以是只读存储器,磁盘或光盘等。尽管上面已经示出和描述了本公开的实施例,可以理解的是,上述实施例是示例性的,不能理解为对本公开的限制,本领域的普通技术人员在本公开的范围内可以对上述实施例进行变化、修改、替换和变型。 The storage media mentioned above can be read-only memory, magnetic disks or optical disks, etc. Although the embodiments of the present disclosure have been shown and described above, it can be understood that the above-mentioned embodiments are illustrative and should not be construed as limitations of the present disclosure. Those of ordinary skill in the art can make modifications to the above-mentioned embodiments within the scope of the present disclosure. The embodiments are subject to changes, modifications, substitutions and variations.

Claims (13)

  1. 一种基于机器人流程自动化RPA和人工智能AI的安全漏洞扫描任务处理方法,其中,所述方法由RPA机器人执行,所述方法包括:A security vulnerability scanning task processing method based on robotic process automation RPA and artificial intelligence AI, wherein the method is executed by an RPA robot, and the method includes:
    确定待处理的目标安全漏洞扫描任务的任务类型;Determine the task type of the target security vulnerability scanning task to be processed;
    根据所述任务类型,启动与所述任务类型对应的安全漏洞扫描应用程序;According to the task type, start a security vulnerability scanning application corresponding to the task type;
    在所述安全漏洞扫描应用程序启动成功的情况下,在所述安全漏洞扫描应用程序中配置所述目标安全漏洞扫描任务的扫描信息,以根据配置后的扫描信息对所述目标安全漏洞扫描任务进行扫描处理。When the security vulnerability scanning application is started successfully, the scanning information of the target security vulnerability scanning task is configured in the security vulnerability scanning application, so as to perform the target security vulnerability scanning task according to the configured scanning information. Perform scan processing.
  2. 根据权利要求1所述的方法,其中,所述在所述安全漏洞扫描应用程序启动成功的情况下,在所述安全漏洞扫描应用程序中配置所述目标安全漏洞扫描任务的扫描信息,以根据配置后的扫描信息对所述目标安全漏洞扫描任务进行扫描处理,包括:The method according to claim 1, wherein when the security vulnerability scanning application is successfully started, the scanning information of the target security vulnerability scanning task is configured in the security vulnerability scanning application to configure the scanning information according to the security vulnerability scanning application. The configured scanning information performs scanning processing on the target security vulnerability scanning task, including:
    在所述安全漏洞扫描应用程序启动成功的情况下,触发所述安全漏洞扫描应用程序中用于新建目标安全漏洞扫描任务页面的控件,以新建与所述任务类型对应的目标安全漏洞扫描任务页面;When the security vulnerability scanning application is successfully started, a control for creating a target security vulnerability scanning task page in the security vulnerability scanning application is triggered to create a new target security vulnerability scanning task page corresponding to the task type. ;
    所述目标安全漏洞扫描任务页面新建成功的情况下,在所述目标安全漏洞扫描任务页面,输入与所述目标安全漏洞扫描任务对应的扫描参数;If the target security vulnerability scanning task page is successfully created, enter the scanning parameters corresponding to the target security vulnerability scanning task on the target security vulnerability scanning task page;
    在所述扫描参数输入完成的情况下,触发所述安全漏洞扫描应用程序中用于扫描目标安全漏洞扫描任务的控件,以根据所述扫描参数对所述目标安全漏洞扫描任务进行扫描处理。When the input of the scanning parameters is completed, the control for scanning the target security vulnerability scanning task in the security vulnerability scanning application is triggered to perform scanning processing on the target security vulnerability scanning task according to the scanning parameters.
  3. 根据权利要求2所述的方法,其中,所述目标安全漏洞扫描任务页面新建成功的情况下,在所述目标安全漏洞扫描任务页面,输入与目标安全漏洞扫描任务对应的扫描参数之前,还包括:The method according to claim 2, wherein if the target security vulnerability scanning task page is successfully created, before inputting the scanning parameters corresponding to the target security vulnerability scanning task on the target security vulnerability scanning task page, the method further includes: :
    根据所述任务类型,获取与所述任务类型匹配的目标文件;According to the task type, obtain a target file matching the task type;
    基于自然语言处理NLP技术,从所述目标文件中提取与所述目标安全漏洞扫描任务对应的扫描参数。Based on natural language processing NLP technology, scan parameters corresponding to the target security vulnerability scanning task are extracted from the target file.
  4. 根据权利要求1至3中任一项所述的方法,其中,所述任务类型为主机扫描,所述根据所述任务类型,启动与所述任务类型对应的安全漏洞扫描应用程序,包括:The method according to any one of claims 1 to 3, wherein the task type is host scanning, and starting a security vulnerability scanning application corresponding to the task type according to the task type includes:
    在至少一个安全漏洞扫描应用程序中,查询扫描处理的任务类型与所述主机扫描匹配 的目标安全漏洞扫描应用程序;In at least one security vulnerability scanning application, the query scan handles a task type that matches the host scan Target security vulnerability scanning applications;
    触发所述目标安全漏洞扫描应用程序上用于展示登陆页面的控件,以展示所述目标安全漏洞扫描应用程序的登陆页面;Triggering a control on the target security vulnerability scanning application for displaying a login page to display the login page of the target security vulnerability scanning application;
    在所述登录页面输入登录信息,以根据所述登录信息执行登录。Enter login information on the login page to perform login based on the login information.
  5. 根据权利要求4所述的方法,其中,所述登录信息包括账户信息和验证码,所述在所述登录页面输入登录信息,以根据所述登录信息执行登录,包括:The method according to claim 4, wherein the login information includes account information and a verification code, and inputting the login information on the login page to perform login according to the login information includes:
    在所述登录页面响应于输入的所述账户信息,在显示设定内容的情况下,触发所述登录页面上用于获取验证码的控件;On the login page, in response to the input account information and displaying the setting content, trigger the control on the login page for obtaining the verification code;
    通过所述账户信息关联的即时通信软件接收目标信息;Receive target information through the instant messaging software associated with the account information;
    基于自然语言处理NLP技术,提取所述目标信息中的验证码;Based on natural language processing NLP technology, extract the verification code in the target information;
    在所述登录页面输入所述验证码,以根据所述验证码和所述账户信息执行登录。Enter the verification code on the login page to perform login based on the verification code and the account information.
  6. 根据权利要求1至5中任一项所述的方法,其中,所述方法还包括:The method according to any one of claims 1 to 5, wherein the method further comprises:
    验证扫描处理所需的各扫描参数是否为空;Verify that each scan parameter required for scan processing is empty;
    在存在至少一个所述扫描处理所需的扫描参数为空的情况下,重新在所述安全漏洞扫描应用程序中配置所述目标安全漏洞扫描任务的扫描信息。If at least one scan parameter required for the scanning process is empty, the scanning information of the target security vulnerability scanning task is re-configured in the security vulnerability scanning application.
  7. 根据权利要求1至5中任一项所述的方法,其中,所述方法还包括:The method according to any one of claims 1 to 5, wherein the method further comprises:
    获取所述目标安全漏洞扫描任务的扫描处理信息;Obtain the scanning processing information of the target security vulnerability scanning task;
    基于光学字符识别技术OCR,识别所述扫描处理信息中安全漏洞的数量以及各安全漏洞的描述信息;Based on optical character recognition technology OCR, identify the number of security vulnerabilities in the scanned processing information and the description information of each security vulnerability;
    根据所述安全漏洞的数量以及所述至少一个安全漏洞的描述信息,生成安全漏洞扫描处理信息文件;Generate a security vulnerability scanning processing information file according to the number of security vulnerabilities and the description information of at least one security vulnerability;
    将所述安全漏洞扫描处理信息文件发送至用户端。Send the security vulnerability scanning processing information file to the user terminal.
  8. 一种基于机器人流程自动化RPA和人工智能AI的安全漏洞扫描任务处理装置,其中,应用于RPA机器人,所述装置包括:A security vulnerability scanning task processing device based on robotic process automation RPA and artificial intelligence AI, which is applied to RPA robots, and the device includes:
    确定模块,用于确定待处理的目标安全漏洞扫描任务的任务类型;The determination module is used to determine the task type of the target security vulnerability scanning task to be processed;
    启动模块,用于根据所述任务类型,启动与所述任务类型对应的安全漏洞扫描应用程序;A startup module, configured to start a security vulnerability scanning application corresponding to the task type according to the task type;
    处理模块,用于在所述安全漏洞扫描应用程序启动成功的情况下,在所述安全漏洞扫 描应用程序中配置所述目标安全漏洞扫描任务的扫描信息,以根据配置后的扫描信息对所述目标安全漏洞扫描任务进行扫描处理。A processing module, configured to: when the security vulnerability scanning application is started successfully, Configure the scanning information of the target security vulnerability scanning task in the scanning application, so as to perform scanning processing on the target security vulnerability scanning task according to the configured scanning information.
  9. 根据权利要求8所述的装置,其中,所述处理模块,还用于:The device according to claim 8, wherein the processing module is also used for:
    所述安全漏洞扫描应用程序启动成功的情况下,触发所述安全漏洞扫描应用程序中用于新建目标安全漏洞扫描任务页面的控件,以新建与所述任务类型对应的目标安全漏洞扫描任务页面;When the security vulnerability scanning application is successfully started, triggering a control in the security vulnerability scanning application for creating a target security vulnerability scanning task page to create a new target security vulnerability scanning task page corresponding to the task type;
    所述目标安全漏洞扫描任务页面新建成功的情况下,在所述目标安全漏洞扫描任务页面,输入与所述目标安全漏洞扫描任务对应的扫描参数;If the target security vulnerability scanning task page is successfully created, enter the scanning parameters corresponding to the target security vulnerability scanning task on the target security vulnerability scanning task page;
    在所述设置节点状态为扫描参数输入完成的情况下,触发所述安全漏洞扫描应用程序中用于扫描目标安全漏洞扫描任务的控件,以根据所述扫描参数对所述目标安全漏洞扫描任务进行扫描处理。When the setting node status is that the input of scanning parameters is completed, the control for scanning the target security vulnerability scanning task in the security vulnerability scanning application is triggered to perform the target security vulnerability scanning task according to the scanning parameters. Scan processing.
  10. 一种电子设备,包括存储器、处理器及存储在存储器上并可在处理器上运行的计算机程序,所述处理器执行所述计算机程序时,实现如权利要求1至7中任一所述的方法。An electronic device, including a memory, a processor, and a computer program stored in the memory and executable on the processor. When the processor executes the computer program, the method of any one of claims 1 to 7 is implemented. method.
  11. 一种非临时性计算机可读存储介质,其上存储有计算机程序,其中,所述计算机程序被处理器执行时实现如权利要求1至7中任一所述的方法。A non-transitory computer-readable storage medium on which a computer program is stored, wherein when the computer program is executed by a processor, the method according to any one of claims 1 to 7 is implemented.
  12. 一种计算机程序产品,包括计算机程序,所述计算机程序在被处理器执行时实现如权利要求1至7中任一项所述的方法。A computer program product comprising a computer program which, when executed by a processor, implements the method of any one of claims 1 to 7.
  13. 一种计算机程序,包括计算机程序代码,当所述计算机程序代码在计算机上运行时,使得计算机执行如权利要求1至7中任一项所述的方法。 A computer program, including computer program code, when the computer program code is run on a computer, causes the computer to perform the method according to any one of claims 1 to 7.
PCT/CN2023/109171 2022-07-25 2023-07-25 Security vulnerability scanning task processing method based on rpa and ai, and related device WO2024022355A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202210879084.5A CN115203698A (en) 2022-07-25 2022-07-25 Security vulnerability scanning task processing method based on RPA and AI and related equipment
CN202210879084.5 2022-07-25

Publications (1)

Publication Number Publication Date
WO2024022355A1 true WO2024022355A1 (en) 2024-02-01

Family

ID=83583750

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2023/109171 WO2024022355A1 (en) 2022-07-25 2023-07-25 Security vulnerability scanning task processing method based on rpa and ai, and related device

Country Status (2)

Country Link
CN (1) CN115203698A (en)
WO (1) WO2024022355A1 (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115203698A (en) * 2022-07-25 2022-10-18 北京来也网络科技有限公司 Security vulnerability scanning task processing method based on RPA and AI and related equipment
CN116502225B (en) * 2023-06-20 2023-09-19 杭州海康威视数字技术股份有限公司 Virus scanning method and device for self-adaptive packet redundancy arrangement and electronic equipment

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109561060A (en) * 2017-09-27 2019-04-02 北京国双科技有限公司 A kind of Distributed Scans method, apparatus and system
US10360022B2 (en) * 2016-01-13 2019-07-23 International Business Machines Corporation Software discovery scan optimization based on product priorities
CN113721960A (en) * 2021-08-31 2021-11-30 北京来也网络科技有限公司 Application program bug fixing method and device based on RPA and AI
CN114036530A (en) * 2021-11-22 2022-02-11 中邮信息科技(北京)有限公司 Kubernetes-based web vulnerability scanning method and device, electronic equipment and medium
CN114741298A (en) * 2022-04-12 2022-07-12 厦门农芯数字科技有限公司 Vulnerability detection method and device
CN115203698A (en) * 2022-07-25 2022-10-18 北京来也网络科技有限公司 Security vulnerability scanning task processing method based on RPA and AI and related equipment

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10360022B2 (en) * 2016-01-13 2019-07-23 International Business Machines Corporation Software discovery scan optimization based on product priorities
CN109561060A (en) * 2017-09-27 2019-04-02 北京国双科技有限公司 A kind of Distributed Scans method, apparatus and system
CN113721960A (en) * 2021-08-31 2021-11-30 北京来也网络科技有限公司 Application program bug fixing method and device based on RPA and AI
CN114036530A (en) * 2021-11-22 2022-02-11 中邮信息科技(北京)有限公司 Kubernetes-based web vulnerability scanning method and device, electronic equipment and medium
CN114741298A (en) * 2022-04-12 2022-07-12 厦门农芯数字科技有限公司 Vulnerability detection method and device
CN115203698A (en) * 2022-07-25 2022-10-18 北京来也网络科技有限公司 Security vulnerability scanning task processing method based on RPA and AI and related equipment

Also Published As

Publication number Publication date
CN115203698A (en) 2022-10-18

Similar Documents

Publication Publication Date Title
WO2024022355A1 (en) Security vulnerability scanning task processing method based on rpa and ai, and related device
WO2019196274A1 (en) Web page testing method and apparatus, electronic device, and medium
US8171406B1 (en) Automating user interface navigation
CN108959068B (en) Software interface testing method, device and storage medium
KR101087312B1 (en) Importation of automatically generated content
US6108799A (en) Automated sample creation of polymorphic and non-polymorphic marcro viruses
US20080282160A1 (en) Designated screen capturing and automatic image exporting
US20070288937A1 (en) Virtual Device Driver
KR20070039877A (en) Automatic image capture for generating content
CN113342590B (en) NVMe device debugging function implementation method, device, equipment and storage medium
CN107688541A (en) File reviewing method, device, server and computer-readable recording medium
CN102262541A (en) Method for starting dynamic configuration plug-in
US10135684B2 (en) Differential staging of devices in bulk enrollment
US20070294430A1 (en) Generating a device address persistent across different instantiations of an electronic device
US20080079738A1 (en) Method and system for testing computer graphic display controller
WO2010064317A2 (en) Operation management support program, recording medium on which said program is recorded, operation management support device, and operation management support method
US8381187B2 (en) Graphical user interface for job output retrieval based on errors
WO2018103223A1 (en) Method and device for operating database
JP2010224828A (en) Computer automatic kitting system
CN114201382A (en) Test case generation method and device, storage medium and electronic equipment
CN114499984B (en) Identity authentication method, device, equipment and medium based on AI and RPA
CN112416769A (en) Automatic test method and system for simulating user operation in batches under cloud desktop scene
Bangia Dictionary of information technology
US20240036552A1 (en) Device management method and electronic device
Ueno et al. SSH Kernel: A Jupyter Extension Specifically for Remote Infrastructure Administration

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 23845564

Country of ref document: EP

Kind code of ref document: A1